uting program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:46:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:46:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:46:59 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(0xffffffffffffffff) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:46:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 340.317319] vfat: Unknown parameter 'defcont' [ 340.336229] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 340.337637] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 340.360716] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 340.366623] No source specified 15:47:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:47:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:47:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 1: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 349.704112] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 349.712563] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 349.744899] vfat: Unknown parameter 'defcont' [ 349.760325] No source specified [ 349.769357] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 349.776317] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:47:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB]) 15:47:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 349.925888] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 349.964137] vfat: Unknown parameter 'defcont' [ 349.981168] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 349.989597] No source specified [ 349.991069] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 350.026629] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:09 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:09 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:47:09 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB]) 15:47:09 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 350.157457] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 350.162633] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 350.169633] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 350.208360] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:18 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYBLOB]) 15:47:18 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:47:18 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:47:18 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:18 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:18 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:18 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 358.462079] vfat: Unknown parameter 'defcon' [ 358.468211] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 358.470932] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:18 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:47:18 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 358.511256] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 358.512597] vfat: Unknown parameter 'defcont' [ 358.523175] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 358.523678] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 358.575417] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 358.614650] vfat: Unknown parameter 'defcon' 15:47:28 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:28 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:47:28 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:47:28 executing program 4: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:28 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:28 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:28 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:28 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 369.287582] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 369.288801] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 369.305536] vfat: Unknown parameter 'defcont' 15:47:28 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 369.321203] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 369.324312] No source specified [ 369.348365] vfat: Unknown parameter 'defcon' 15:47:29 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:47:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:29 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 369.409638] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 369.449289] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:29 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:47:29 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 369.492599] vfat: Unknown parameter 'defcont' [ 369.524667] No source specified [ 369.558465] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 369.565118] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:47:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:38 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:47:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB]) [ 379.079223] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 379.084822] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:47:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 379.106968] vfat: Bad value for 'defcontext' [ 379.116570] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 379.122644] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 379.127641] No source specified 15:47:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYBLOB]) [ 379.163558] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:38 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 379.190672] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 379.206399] vfat: Unknown parameter 'defcont' 15:47:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 379.220167] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 379.231539] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 379.273580] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 379.307124] vfat: Unknown parameter 'defcont' 15:47:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:47:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:47:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB]) 15:47:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 387.682146] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 387.687180] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 387.689322] vfat: Bad value for 'defcontext' [ 387.708740] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 387.718317] No source specified [ 387.723815] vfat: Unknown parameter 'defcont' 15:47:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 387.728216] No source specified 15:47:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 387.781491] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 387.784809] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB]) [ 387.822445] vfat: Bad value for 'defcontext' 15:47:47 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 387.834925] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 387.867585] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:47:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 387.933087] No source specified [ 387.936482] No source specified [ 387.937801] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:47:47 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 387.952548] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 387.983482] SELinux: security_context_str_to_sid () failed with errno=-22 15:47:55 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:55 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB]) 15:47:55 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:47:55 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:47:55 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:55 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:47:55 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:47:55 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 395.885499] No source specified [ 395.914030] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 395.919466] vfat: Bad value for 'defcontext' [ 395.958385] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 395.960288] No source specified [ 395.962367] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:48:04 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:48:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:04 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:48:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) 15:48:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB]) 15:48:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 404.414259] vfat: Unknown parameter 'defcon' [ 404.415955] vfat: Unknown parameter 'defcont' 15:48:04 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 404.433749] No source specified [ 404.435901] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 404.449408] vfat: Bad value for 'defcontext' 15:48:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) [ 404.485288] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 404.491976] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB]) 15:48:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>']) 15:48:04 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 404.532847] vfat: Unknown parameter 'defcon' [ 404.540130] vfat: Unknown parameter 'defcont' 15:48:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:04 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) [ 404.578403] No source specified [ 404.579009] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 404.583344] vfat: Bad value for 'defcontext' 15:48:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:48:04 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 404.639619] vfat: Unknown parameter 'defcon' 15:48:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB, @ANYBLOB]) 15:48:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) [ 404.684938] No source specified 15:48:04 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 404.700364] vfat: Unknown parameter 'defcon' [ 404.713085] No source specified [ 404.744500] vfat: Unknown parameter 'defcont' [ 404.745210] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 404.764536] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) 15:48:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:48:12 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:48:12 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:12 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm', @ANYBLOB]) 15:48:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) [ 413.228365] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 413.229971] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 413.231095] vfat: Unknown parameter 'defcon' [ 413.247107] vfat: Bad value for 'defcontext' [ 413.267486] No source specified [ 413.276093] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) 15:48:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:48:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm', @ANYBLOB]) 15:48:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) [ 413.379406] vfat: Bad value for 'defcontext' [ 413.403390] vfat: Unknown parameter 'defcon' 15:48:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:13 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 413.475436] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 413.481486] No source specified [ 413.519176] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:21 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm', @ANYBLOB]) 15:48:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:48:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon', @ANYBLOB]) 15:48:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 422.028612] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 422.034259] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 422.036555] vfat: Bad value for 'defcontext' [ 422.049157] vfat: Unknown parameter 'defcon' [ 422.053946] No source specified [ 422.060840] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:48:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:21 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm', @ANYBLOB]) [ 422.141156] SELinux: security_context_str_to_sid () failed with errno=-22 [ 422.142325] vfat: Unknown parameter 'defcont' 15:48:21 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm', @ANYBLOB]) 15:48:21 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 422.191312] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:48:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 422.237457] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 422.239925] vfat: Unknown parameter 'defcont' [ 422.240608] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 422.257521] vfat: Bad value for 'defcontext' [ 422.258319] No source specified 15:48:21 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 422.265485] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:21 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:48:21 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 422.345541] vfat: Unknown parameter 'defcont' [ 422.348199] vfat: Bad value for 'defcontext' [ 422.356490] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 422.368578] No source specified 15:48:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm', @ANYBLOB]) 15:48:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:48:30 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s', @ANYBLOB]) 15:48:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:48:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:30 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:30 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 430.692647] vfat: Unknown parameter 'defcon' [ 430.700101] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 430.701638] vfat: Bad value for 'defcontext' [ 430.762220] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 430.797464] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 430.806526] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:38 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, 0x0) 15:48:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) [ 438.975886] vfat: Unknown parameter 'defcont' 15:48:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:38 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) [ 439.035252] vfat: Unknown parameter 'defcon' [ 439.045821] vfat: Unknown parameter 'defcont' [ 439.053388] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:38 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:48:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:48:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:38 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYBLOB]) [ 439.143561] vfat: Unknown parameter 'defcon' 15:48:38 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:38 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:38 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, 0x0) [ 439.213656] vfat: Unknown parameter 'defcon' [ 439.225674] vfat: Unknown parameter 'defcont' 15:48:38 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB]) [ 439.236915] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 439.246967] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:38 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) [ 439.305051] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 439.333239] vfat: Unknown parameter 'defcont' [ 439.337027] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:47 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:47 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:48:47 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>']) 15:48:47 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:47 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:47 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:48:47 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, 0x0) 15:48:47 executing program 6: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 448.347539] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 448.353111] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 448.357324] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 448.366440] vfat: Unknown parameter 'defcont' [ 448.373942] vfat: Unknown parameter 'defcont' [ 448.380950] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:48:48 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:48:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:48:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>']) 15:48:58 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:48:58 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:48:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:48:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s', @ANYBLOB]) [ 458.566958] vfat: Bad value for 'defcontext' [ 458.570451] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 458.598364] vfat: Unknown parameter 'defcont' [ 458.605959] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 458.614648] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:48:58 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 458.642956] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:48:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:48:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:48:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:48:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 458.730528] vfat: Bad value for 'defcontext' 15:48:58 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>']) 15:48:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) [ 458.773239] No source specified [ 458.800965] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 458.803506] vfat: Unknown parameter 'defcont' 15:48:58 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 458.835332] vfat: Unknown parameter 'defcont' 15:48:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:48:58 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 458.905748] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 458.921800] No source specified [ 458.958823] vfat: Bad value for 'defcontext' 15:49:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:49:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[]) 15:49:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:49:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:49:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:49:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:49:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) 15:49:07 executing program 0: io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000001380)=[{&(0x7f0000000000)=""/4096, 0x1000}, {&(0x7f0000001000)=""/141, 0x8d}, {&(0x7f00000010c0)=""/152, 0x98}, {&(0x7f0000001180)=""/121, 0x79}, {&(0x7f0000001200)=""/170, 0xaa}, {&(0x7f00000012c0)=""/132, 0x84}], 0x6) syz_io_uring_setup(0x2d5f, &(0x7f0000001400)={0x0, 0x656e, 0x1, 0x3, 0x3a9}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000c00000/0x400000)=nil, &(0x7f0000001480), &(0x7f00000014c0)) rt_tgsigqueueinfo(0x0, 0x0, 0x4, &(0x7f0000002c40)={0x10, 0x3, 0x7}) [ 467.484114] No source specified [ 467.486117] No source specified [ 467.494026] vfat: Unknown parameter 'defcont' 15:49:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 467.518537] SELinux: security_context_str_to_sid () failed with errno=-22 15:49:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 467.541002] vfat: Unknown parameter 'defcont' [ 467.547564] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:49:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[]) [ 467.587408] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:49:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:49:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) close(r0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 467.604561] No source specified 15:49:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont', @ANYBLOB]) [ 467.616965] No source specified 15:49:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:49:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:49:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[]) 15:49:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) [ 467.679889] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 467.706601] SELinux: security_context_str_to_sid () failed with errno=-22 [ 467.709955] No source specified [ 467.724880] vfat: Unknown parameter 'defcont' [ 467.726806] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 467.731261] vfat: Unknown parameter 'defcont' 15:49:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) close(r0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:49:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 467.778013] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 467.807467] No source specified [ 467.809976] vfat: Bad value for 'defcontext' [ 467.815555] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:49:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:07 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 467.878018] No source specified [ 467.905490] No source specified [ 467.911933] vfat: Unknown parameter 'defcont' [ 467.921647] vfat: Bad value for 'defcontext' [ 467.924174] vfat: Bad value for 'defcontext' 15:49:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01]) 15:49:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:49:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:17 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) close(r0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:49:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 477.558408] vfat: Unknown parameter 'defcont' [ 477.564235] vfat: Bad value for 'defcontext' [ 477.568920] No source specified [ 477.596424] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 477.607046] No source specified [ 477.608307] No source specified [ 477.625037] vfat: Bad value for 'defcontext' 15:49:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:49:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:17 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:49:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) [ 477.704470] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:49:17 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) [ 477.767172] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 477.783170] vfat: Bad value for 'defcontext' [ 477.811766] vfat: Unknown parameter 'defcon' [ 477.826147] vfat: Unknown parameter 'defcon' [ 477.843330] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:49:26 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:49:26 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:26 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 1) 15:49:26 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:26 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) close(r0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:49:26 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_script(r0, &(0x7f0000000000)=ANY=[@ANYBLOB='G'], 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, &(0x7f0000000380)=[{&(0x7f0000000140)="7fa491390e28eba5bb8b37c775667c93336bc5b84353f625fbf5842a680567913c7f362aae55b85031b4ee249104f86ff18fa2797bbfb8", 0x37, 0x2}, {&(0x7f0000000180)="f0b1fc6b6a9a37d8fc8c99b642be98e771ee3be3ed43b6df44637cd32bd71349185ea1643133d4e5bf9277d0dc0cb821f0d24720d19e9e699106d43886ff77bd430bd0be28076c987663973ec6317c4f9d41a136645b7a442fb27e95ef957a1ed3eba0cac3806e844f9e155039b162a1ec4b68d862b986c9791555a29100cb7536e78fa20158c4332ec194595c7a68b3f552cf51de40d6f48403dede96bd4867f435d1f4087b3ce9713571b034cf8b510ea9e93e32caddd0f38d0292ab43018b436da3c9fe1357d0a28b5cd0dd08cc17f0", 0xd1, 0x6}, {&(0x7f00000002c0)="eac1c779893a68b975bb1b4ddd7868add1827fa095836c5cb1101d35af11c0a07a6c4026e18911e3875047efeaa7549605e8aacc33e9224d5d9885459115b27f37bd8bc92313ff29d34e5e5786752babbb8632c588287c7ff48c06ab120c1c68ec484948523544b77d5cd32a8436d1da13ee27d8ce408fd62b95e3f12e89243b7fde747fa4188fbdff1e58572dc5eb2ecff9b18be629d33892f444f494341eb720a8e405952a480a5c951e31ca9e68634faef48e029e64c7a960cb", 0xbb, 0x6}], 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>', @ANYRESDEC=0xee01, @ANYBLOB="2c7065726d69745f6469726563745d696150a9b2959a726f6c653d5e2c00"]) 15:49:26 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:26 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fowner>']) [ 486.479390] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 486.517921] vfat: Bad value for 'defcontext' [ 486.545108] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 [ 486.559352] vfat: Bad value for 'defcontext' [ 486.560549] vfat: Unknown parameter 'defcon' [ 486.562519] vfat: Unknown parameter 'defcon' [ 486.568611] FAULT_INJECTION: forcing a failure. [ 486.568611] name failslab, interval 1, probability 0, space 0, times 1 [ 486.570363] CPU: 1 UID: 0 PID: 5518 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 486.570398] Tainted: [W]=WARN [ 486.570405] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 486.570418] Call Trace: [ 486.570425] [ 486.570433] dump_stack_lvl+0xfa/0x120 [ 486.570472] should_fail_ex+0x4d7/0x5e0 [ 486.570502] ? getname_flags.part.0+0x48/0x540 [ 486.570532] should_failslab+0xc2/0x120 [ 486.570559] kmem_cache_alloc_noprof+0x72/0x690 [ 486.570584] ? fput+0x6a/0x100 [ 486.570614] ? getname_flags.part.0+0x48/0x540 [ 486.570643] getname_flags.part.0+0x48/0x540 [ 486.570676] __x64_sys_mkdir+0xdb/0x140 [ 486.570708] do_syscall_64+0xbf/0x360 [ 486.570730] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.570753] RIP: 0033:0x7fadd609ac27 [ 486.570770] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 486.570790] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 486.570811] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 486.570825] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 486.570838] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 486.570852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 486.570864] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 486.570893] [ 486.621448] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:49:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:49:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 1) 15:49:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 2) 15:49:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:49:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 495.429468] vfat: Bad value for 'defcontext' [ 495.432964] vfat: Unknown parameter 'defcon' [ 495.445224] No source specified 15:49:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:49:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 495.476459] vfat: Unknown parameter 'defcon' [ 495.479024] FAULT_INJECTION: forcing a failure. [ 495.479024] name failslab, interval 1, probability 0, space 0, times 0 [ 495.480028] CPU: 0 UID: 0 PID: 5536 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 495.480075] Tainted: [W]=WARN [ 495.480085] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 495.480103] Call Trace: [ 495.480111] [ 495.480122] dump_stack_lvl+0xfa/0x120 [ 495.480173] should_fail_ex+0x4d7/0x5e0 [ 495.480212] ? getname_flags.part.0+0x48/0x540 [ 495.480253] should_failslab+0xc2/0x120 [ 495.480268] kmem_cache_alloc_noprof+0x72/0x690 [ 495.480282] ? fput+0x6a/0x100 [ 495.480302] ? getname_flags.part.0+0x48/0x540 [ 495.480320] getname_flags.part.0+0x48/0x540 [ 495.480338] __x64_sys_mkdir+0xdb/0x140 [ 495.480352] do_syscall_64+0xbf/0x360 [ 495.480365] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.480378] RIP: 0033:0x7f4dc31f3c27 [ 495.480388] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 495.480400] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.480412] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 495.480420] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 495.480427] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 495.480435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 495.480442] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 495.480458] [ 495.491999] SELinux: security_context_str_to_sid () failed with errno=-22 [ 495.497335] vfat: Bad value for 'defcontext' [ 495.508868] SELinux: security_context_str_to_sid () failed with errno=-22 [ 495.541125] SELinux: security_context_str_to_sid () failed with errno=-22 15:49:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:49:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:49:35 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 3) 15:49:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 495.590283] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:49:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 2) 15:49:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 495.636116] SELinux: security_context_str_to_sid () failed with errno=-22 15:49:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) [ 495.681967] No source specified [ 495.683663] FAULT_INJECTION: forcing a failure. [ 495.683663] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 495.685586] CPU: 1 UID: 0 PID: 5554 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 495.685622] Tainted: [W]=WARN [ 495.685629] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 495.685642] Call Trace: [ 495.685649] [ 495.685657] dump_stack_lvl+0xfa/0x120 [ 495.685703] should_fail_ex+0x4d7/0x5e0 [ 495.685733] strncpy_from_user+0x3b/0x2f0 [ 495.685770] getname_flags.part.0+0x8d/0x540 [ 495.685805] __x64_sys_mkdir+0xdb/0x140 [ 495.685830] do_syscall_64+0xbf/0x360 [ 495.685852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.685874] RIP: 0033:0x7fadd609ac27 [ 495.685891] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 495.685912] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.685933] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 495.685947] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 495.685961] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 495.685975] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 495.685988] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 495.686016] [ 495.713471] vfat: Bad value for 'defcontext' [ 495.715388] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 495.717171] vfat: Bad value for 'defcontext' 15:49:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 3) 15:49:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) [ 495.754126] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 495.766510] No source specified 15:49:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 495.792327] No source specified [ 495.813466] FAULT_INJECTION: forcing a failure. [ 495.813466] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 495.814464] CPU: 0 UID: 0 PID: 5568 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 495.814498] Tainted: [W]=WARN [ 495.814502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 495.814510] Call Trace: [ 495.814514] [ 495.814519] dump_stack_lvl+0xfa/0x120 [ 495.814548] should_fail_ex+0x4d7/0x5e0 [ 495.814566] strncpy_from_user+0x3b/0x2f0 [ 495.814587] getname_flags.part.0+0x8d/0x540 [ 495.814607] __x64_sys_mkdir+0xdb/0x140 [ 495.814621] do_syscall_64+0xbf/0x360 [ 495.814634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 495.814648] RIP: 0033:0x7f4dc31f3c27 [ 495.814658] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 495.814670] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 495.814685] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 495.814694] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 495.814701] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 495.814708] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 495.814716] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 495.814731] [ 495.819356] vfat: Bad value for 'defcontext' 15:49:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 4) 15:49:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:49:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:49:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 4) 15:49:44 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) [ 504.782946] vfat: Bad value for 'defcontext' [ 504.784044] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 504.821174] No source specified [ 504.825334] FAULT_INJECTION: forcing a failure. [ 504.825334] name failslab, interval 1, probability 0, space 0, times 0 [ 504.827157] CPU: 0 UID: 0 PID: 5587 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 504.827192] Tainted: [W]=WARN [ 504.827198] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 504.827211] Call Trace: [ 504.827218] [ 504.827227] dump_stack_lvl+0xfa/0x120 [ 504.827267] should_fail_ex+0x4d7/0x5e0 [ 504.827296] ? __d_alloc+0x31/0xa10 [ 504.827319] should_failslab+0xc2/0x120 [ 504.827346] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 504.827370] ? __d_lookup+0x255/0x490 [ 504.827407] ? __d_alloc+0x31/0xa10 [ 504.827429] __d_alloc+0x31/0xa10 [ 504.827458] d_alloc+0x4a/0x1e0 [ 504.827483] lookup_one_qstr_excl+0x174/0x270 [ 504.827513] ? mnt_want_write+0x153/0x420 [ 504.827547] filename_create+0x1ca/0x480 [ 504.827567] ? __pfx_filename_create+0x10/0x10 [ 504.827585] ? __virt_addr_valid+0x2e8/0x5d0 [ 504.827633] do_mkdirat+0x9a/0x3d0 [ 504.827658] ? __pfx_do_mkdirat+0x10/0x10 [ 504.827698] __x64_sys_mkdir+0xf3/0x140 [ 504.827723] do_syscall_64+0xbf/0x360 [ 504.827745] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.827767] RIP: 0033:0x7fadd609ac27 [ 504.827783] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 504.827804] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 504.827826] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 504.827840] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 504.827853] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 504.827867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 504.827879] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 504.827909] [ 504.829304] FAULT_INJECTION: forcing a failure. [ 504.829304] name failslab, interval 1, probability 0, space 0, times 0 [ 504.832209] vfat: Bad value for 'defcontext' 15:49:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 504.832666] CPU: 1 UID: 0 PID: 5588 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 504.832709] Tainted: [W]=WARN [ 504.832716] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 504.832729] Call Trace: [ 504.832737] [ 504.832758] dump_stack_lvl+0xfa/0x120 [ 504.832799] should_fail_ex+0x4d7/0x5e0 [ 504.832830] ? __d_alloc+0x31/0xa10 [ 504.832855] should_failslab+0xc2/0x120 [ 504.832883] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 504.832908] ? __d_lookup+0x255/0x490 15:49:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) [ 504.832946] ? __d_alloc+0x31/0xa10 [ 504.832969] __d_alloc+0x31/0xa10 [ 504.832997] d_alloc+0x4a/0x1e0 [ 504.833023] lookup_one_qstr_excl+0x174/0x270 [ 504.833055] ? mnt_want_write+0x153/0x420 [ 504.833089] filename_create+0x1ca/0x480 [ 504.833110] ? __pfx_filename_create+0x10/0x10 [ 504.833129] ? __virt_addr_valid+0x2e8/0x5d0 [ 504.833178] do_mkdirat+0x9a/0x3d0 [ 504.833203] ? __pfx_do_mkdirat+0x10/0x10 [ 504.833236] __x64_sys_mkdir+0xf3/0x140 [ 504.833261] do_syscall_64+0xbf/0x360 [ 504.833284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 504.833308] RIP: 0033:0x7f4dc31f3c27 [ 504.833324] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 504.833346] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 504.833367] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 504.833382] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 504.833395] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 504.833408] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 504.833422] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 504.833452] [ 504.841052] vfat: Bad value for 'defcontext' [ 504.844202] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:49:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:49:44 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 5) [ 504.959760] vfat: Bad value for 'defcontext' 15:49:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 504.987254] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:49:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 5) [ 505.058329] vfat: Bad value for 'defcontext' 15:49:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm_u,fo']) [ 505.092754] SELinux: security_context_str_to_sid () failed with errno=-22 15:49:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 505.119021] No source specified [ 505.119185] vfat: Bad value for 'defcontext' [ 505.152245] SELinux: security_context_str_to_sid () failed with errno=-22 [ 505.222147] SELinux: security_context_str_to_sid () failed with errno=-22 [ 505.230621] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 15:49:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:49:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 1) 15:49:54 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 6) 15:49:54 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 6) 15:49:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:54 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 1) 15:49:54 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 514.797724] FAULT_INJECTION: forcing a failure. [ 514.797724] name failslab, interval 1, probability 0, space 0, times 0 [ 514.799103] FAULT_INJECTION: forcing a failure. [ 514.799103] name failslab, interval 1, probability 0, space 0, times 0 [ 514.799763] CPU: 0 UID: 0 PID: 5629 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 514.799806] Tainted: [W]=WARN [ 514.799814] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 514.799829] Call Trace: [ 514.799838] [ 514.799849] dump_stack_lvl+0xfa/0x120 [ 514.799896] should_fail_ex+0x4d7/0x5e0 [ 514.799930] ? getname_flags.part.0+0x48/0x540 [ 514.799966] should_failslab+0xc2/0x120 [ 514.799998] kmem_cache_alloc_noprof+0x72/0x690 [ 514.800027] ? fput+0x6a/0x100 [ 514.800064] ? getname_flags.part.0+0x48/0x540 [ 514.800099] getname_flags.part.0+0x48/0x540 [ 514.800138] __x64_sys_mkdir+0xdb/0x140 [ 514.800168] do_syscall_64+0xbf/0x360 [ 514.800193] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 514.800220] RIP: 0033:0x7f52aa14ac27 [ 514.800240] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 514.800265] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 514.800290] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 514.800307] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 514.800323] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 514.800338] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 514.800354] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 514.800387] [ 514.804819] vfat: Bad value for 'defcontext' [ 514.805176] CPU: 1 UID: 0 PID: 5627 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 514.805215] Tainted: [W]=WARN [ 514.805222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 514.805236] Call Trace: [ 514.805245] [ 514.805254] dump_stack_lvl+0xfa/0x120 [ 514.805302] should_fail_ex+0x4d7/0x5e0 [ 514.805335] ? ext4_alloc_inode+0x28/0x600 [ 514.805365] should_failslab+0xc2/0x120 [ 514.805395] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 514.805428] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 514.805460] ? ext4_alloc_inode+0x28/0x600 [ 514.805487] ext4_alloc_inode+0x28/0x600 [ 514.805516] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 514.805544] alloc_inode+0x67/0x250 [ 514.805575] new_inode+0x1e/0x160 [ 514.805607] __ext4_new_inode+0x35d/0x4d70 [ 514.805643] ? avc_has_perm_noaudit+0x150/0x3d0 [ 514.805693] ? __pfx___ext4_new_inode+0x10/0x10 [ 514.805722] ? __pfx_avc_has_perm+0x10/0x10 [ 514.805758] ? __pfx___dquot_initialize+0x10/0x10 [ 514.805802] ext4_mkdir+0x331/0xb30 [ 514.805845] ? __pfx_ext4_mkdir+0x10/0x10 [ 514.805875] ? security_inode_permission+0x72/0xe0 [ 514.805917] vfs_mkdir+0x59a/0x8d0 [ 514.805957] do_mkdirat+0x19f/0x3d0 [ 514.805985] ? __pfx_do_mkdirat+0x10/0x10 [ 514.806020] __x64_sys_mkdir+0xf3/0x140 [ 514.806046] do_syscall_64+0xbf/0x360 [ 514.806070] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 514.806094] RIP: 0033:0x7fadd609ac27 [ 514.806113] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 514.806135] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 514.806157] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 514.806173] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 514.806187] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 514.806202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 514.806216] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 514.806248] [ 514.807401] FAULT_INJECTION: forcing a failure. [ 514.807401] name failslab, interval 1, probability 0, space 0, times 0 [ 514.811024] vfat: Unknown parameter 'defcon' [ 514.811282] CPU: 1 UID: 0 PID: 5624 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 514.811319] Tainted: [W]=WARN [ 514.811327] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 514.811339] Call Trace: [ 514.811346] [ 514.811355] dump_stack_lvl+0xfa/0x120 [ 514.811391] should_fail_ex+0x4d7/0x5e0 [ 514.811419] ? getname_flags.part.0+0x48/0x540 [ 514.811450] should_failslab+0xc2/0x120 [ 514.811476] kmem_cache_alloc_noprof+0x72/0x690 [ 514.811502] ? fput+0x6a/0x100 [ 514.811536] ? getname_flags.part.0+0x48/0x540 [ 514.811567] getname_flags.part.0+0x48/0x540 [ 514.811602] __x64_sys_mkdir+0xdb/0x140 [ 514.811628] do_syscall_64+0xbf/0x360 [ 514.811651] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 514.811673] RIP: 0033:0x7f7957b21c27 [ 514.811698] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 514.811719] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 514.811742] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 514.811756] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 514.811770] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 514.811784] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 514.811798] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 514.811828] [ 514.815197] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:49:54 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:49:54 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 2) [ 514.888629] FAULT_INJECTION: forcing a failure. [ 514.888629] name failslab, interval 1, probability 0, space 0, times 0 [ 514.890856] CPU: 0 UID: 0 PID: 5631 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 514.890892] Tainted: [W]=WARN [ 514.890899] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 514.890912] Call Trace: [ 514.890919] [ 514.890927] dump_stack_lvl+0xfa/0x120 [ 514.890967] should_fail_ex+0x4d7/0x5e0 [ 514.890996] ? ext4_alloc_inode+0x28/0x600 [ 514.891024] should_failslab+0xc2/0x120 [ 514.891051] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 514.891081] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 514.891111] ? ext4_alloc_inode+0x28/0x600 [ 514.891136] ext4_alloc_inode+0x28/0x600 [ 514.891163] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 514.891189] alloc_inode+0x67/0x250 [ 514.891218] new_inode+0x1e/0x160 [ 514.891248] __ext4_new_inode+0x35d/0x4d70 [ 514.891281] ? avc_has_perm_noaudit+0x150/0x3d0 [ 514.891322] ? __pfx___ext4_new_inode+0x10/0x10 [ 514.891348] ? __pfx_avc_has_perm+0x10/0x10 [ 514.891381] ? __pfx___dquot_initialize+0x10/0x10 [ 514.891423] ext4_mkdir+0x331/0xb30 [ 514.891462] ? __pfx_ext4_mkdir+0x10/0x10 [ 514.891491] ? security_inode_permission+0x72/0xe0 [ 514.891529] vfs_mkdir+0x59a/0x8d0 [ 514.891566] do_mkdirat+0x19f/0x3d0 [ 514.891592] ? __pfx_do_mkdirat+0x10/0x10 [ 514.891625] __x64_sys_mkdir+0xf3/0x140 [ 514.891649] do_syscall_64+0xbf/0x360 [ 514.891672] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 514.891702] RIP: 0033:0x7f4dc31f3c27 [ 514.891718] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 514.891739] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 514.891760] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 514.891774] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 514.891787] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 514.891800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 514.891813] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 514.891843] [ 514.902208] vfat: Unknown parameter 'defcont' 15:49:54 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:49:54 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) 15:49:54 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 7) 15:49:54 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 7) [ 515.030556] SELinux: security_context_str_to_sid () failed with errno=-22 [ 515.060987] vfat: Unknown parameter 'defcon' [ 515.062037] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 515.105368] FAULT_INJECTION: forcing a failure. [ 515.105368] name failslab, interval 1, probability 0, space 0, times 0 [ 515.106958] CPU: 1 UID: 0 PID: 5642 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 515.106990] Tainted: [W]=WARN [ 515.106997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 515.107008] Call Trace: [ 515.107015] [ 515.107022] dump_stack_lvl+0xfa/0x120 [ 515.107062] should_fail_ex+0x4d7/0x5e0 [ 515.107089] ? ext4_alloc_inode+0x28/0x600 [ 515.107115] should_failslab+0xc2/0x120 [ 515.107139] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 515.107167] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 515.107194] ? ext4_alloc_inode+0x28/0x600 [ 515.107217] ext4_alloc_inode+0x28/0x600 [ 515.107241] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 515.107265] alloc_inode+0x67/0x250 [ 515.107291] new_inode+0x1e/0x160 [ 515.107318] __ext4_new_inode+0x35d/0x4d70 [ 515.107348] ? avc_has_perm_noaudit+0x150/0x3d0 [ 515.107384] ? __pfx___ext4_new_inode+0x10/0x10 [ 515.107409] ? __pfx_avc_has_perm+0x10/0x10 [ 515.107438] ? __pfx___dquot_initialize+0x10/0x10 [ 515.107476] ext4_mkdir+0x331/0xb30 [ 515.107512] ? __pfx_ext4_mkdir+0x10/0x10 [ 515.107538] ? security_inode_permission+0x72/0xe0 [ 515.107573] vfs_mkdir+0x59a/0x8d0 [ 515.107606] do_mkdirat+0x19f/0x3d0 [ 515.107629] ? __pfx_do_mkdirat+0x10/0x10 [ 515.107658] __x64_sys_mkdir+0xf3/0x140 [ 515.107688] do_syscall_64+0xbf/0x360 [ 515.107708] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.107728] RIP: 0033:0x7f4dc31f3c27 [ 515.107743] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 515.107762] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 515.107782] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 515.107795] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 515.107807] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 515.107819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 515.107831] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 515.107858] [ 515.110457] FAULT_INJECTION: forcing a failure. [ 515.110457] name failslab, interval 1, probability 0, space 0, times 0 [ 515.140776] CPU: 0 UID: 0 PID: 5643 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 515.140817] Tainted: [W]=WARN [ 515.140824] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 515.140851] Call Trace: [ 515.140862] [ 515.140873] dump_stack_lvl+0xfa/0x120 [ 515.140917] should_fail_ex+0x4d7/0x5e0 [ 515.140948] ? ext4_alloc_inode+0x28/0x600 [ 515.140976] should_failslab+0xc2/0x120 [ 515.141004] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 515.141036] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 515.141066] ? ext4_alloc_inode+0x28/0x600 [ 515.141092] ext4_alloc_inode+0x28/0x600 [ 515.141121] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 515.141147] alloc_inode+0x67/0x250 [ 515.141177] new_inode+0x1e/0x160 [ 515.141208] __ext4_new_inode+0x35d/0x4d70 [ 515.141242] ? avc_has_perm_noaudit+0x150/0x3d0 [ 515.141283] ? __pfx___ext4_new_inode+0x10/0x10 [ 515.141311] ? __pfx_avc_has_perm+0x10/0x10 [ 515.141344] ? __pfx___dquot_initialize+0x10/0x10 [ 515.141388] ext4_mkdir+0x331/0xb30 [ 515.141429] ? __pfx_ext4_mkdir+0x10/0x10 [ 515.141458] ? security_inode_permission+0x72/0xe0 [ 515.141498] vfs_mkdir+0x59a/0x8d0 [ 515.141536] do_mkdirat+0x19f/0x3d0 [ 515.141563] ? __pfx_do_mkdirat+0x10/0x10 [ 515.141596] __x64_sys_mkdir+0xf3/0x140 [ 515.141622] do_syscall_64+0xbf/0x360 [ 515.141645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 515.141669] RIP: 0033:0x7fadd609ac27 [ 515.141696] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 515.141717] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 515.141739] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 515.141753] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 515.141766] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 515.141779] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 515.141792] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 515.141823] 15:50:03 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 2) 15:50:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 8) 15:50:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcon']) 15:50:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 3) 15:50:03 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:03 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:50:03 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 8) 15:50:03 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 523.842080] FAULT_INJECTION: forcing a failure. [ 523.842080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 523.843206] CPU: 1 UID: 0 PID: 5656 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 523.843229] Tainted: [W]=WARN [ 523.843233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 523.843241] Call Trace: [ 523.843247] [ 523.843252] dump_stack_lvl+0xfa/0x120 [ 523.843276] should_fail_ex+0x4d7/0x5e0 [ 523.843294] strncpy_from_user+0x3b/0x2f0 [ 523.843315] getname_flags.part.0+0x8d/0x540 [ 523.843335] __x64_sys_mkdir+0xdb/0x140 [ 523.843349] do_syscall_64+0xbf/0x360 [ 523.843361] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.843374] RIP: 0033:0x7f52aa14ac27 [ 523.843384] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 523.843395] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 523.843407] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 523.843415] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 523.843421] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 523.843428] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 523.843435] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 523.843451] [ 523.866124] FAULT_INJECTION: forcing a failure. [ 523.866124] name failslab, interval 1, probability 0, space 0, times 0 [ 523.867249] CPU: 1 UID: 0 PID: 5658 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 523.867273] Tainted: [W]=WARN [ 523.867278] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 523.867287] Call Trace: [ 523.867292] [ 523.867299] dump_stack_lvl+0xfa/0x120 [ 523.867330] should_fail_ex+0x4d7/0x5e0 [ 523.867352] ? security_inode_alloc+0x3e/0x130 [ 523.867372] should_failslab+0xc2/0x120 [ 523.867392] kmem_cache_alloc_noprof+0x72/0x690 [ 523.867407] ? __pfx_map_id_range_down+0x10/0x10 [ 523.867433] ? security_inode_alloc+0x3e/0x130 [ 523.867451] security_inode_alloc+0x3e/0x130 [ 523.867472] inode_init_always_gfp+0xc94/0xff0 [ 523.867492] alloc_inode+0x8d/0x250 [ 523.867512] new_inode+0x1e/0x160 [ 523.867533] __ext4_new_inode+0x35d/0x4d70 [ 523.867557] ? avc_has_perm_noaudit+0x150/0x3d0 [ 523.867587] ? __pfx___ext4_new_inode+0x10/0x10 [ 523.867605] ? __pfx_avc_has_perm+0x10/0x10 [ 523.867629] ? __pfx___dquot_initialize+0x10/0x10 [ 523.867659] ext4_mkdir+0x331/0xb30 [ 523.867692] ? __pfx_ext4_mkdir+0x10/0x10 [ 523.867711] ? security_inode_permission+0x72/0xe0 [ 523.867738] vfs_mkdir+0x59a/0x8d0 [ 523.867764] do_mkdirat+0x19f/0x3d0 [ 523.867782] ? __pfx_do_mkdirat+0x10/0x10 [ 523.867804] __x64_sys_mkdir+0xf3/0x140 [ 523.867822] do_syscall_64+0xbf/0x360 [ 523.867837] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.867854] RIP: 0033:0x7f4dc31f3c27 [ 523.867867] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 523.867882] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 523.867897] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 523.867907] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 523.867916] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 523.867925] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 523.867934] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 523.867956] [ 523.896596] vfat: Unknown parameter 'defcont' [ 523.901666] FAULT_INJECTION: forcing a failure. [ 523.901666] name failslab, interval 1, probability 0, space 0, times 0 [ 523.903963] CPU: 0 UID: 0 PID: 5653 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 523.904011] Tainted: [W]=WARN 15:50:03 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 4) [ 523.904022] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 523.904041] Call Trace: [ 523.904050] [ 523.904060] dump_stack_lvl+0xfa/0x120 [ 523.904111] should_fail_ex+0x4d7/0x5e0 [ 523.904150] ? security_inode_alloc+0x3e/0x130 [ 523.904183] should_failslab+0xc2/0x120 [ 523.904211] kmem_cache_alloc_noprof+0x72/0x690 [ 523.904235] ? __pfx_map_id_range_down+0x10/0x10 [ 523.904272] ? security_inode_alloc+0x3e/0x130 [ 523.904301] security_inode_alloc+0x3e/0x130 [ 523.904333] inode_init_always_gfp+0xc94/0xff0 [ 523.904364] alloc_inode+0x8d/0x250 [ 523.904394] new_inode+0x1e/0x160 [ 523.904426] __ext4_new_inode+0x35d/0x4d70 [ 523.904461] ? avc_has_perm_noaudit+0x150/0x3d0 [ 523.904505] ? __pfx___ext4_new_inode+0x10/0x10 [ 523.904533] ? __pfx_avc_has_perm+0x10/0x10 [ 523.904569] ? __pfx___dquot_initialize+0x10/0x10 [ 523.904614] ext4_mkdir+0x331/0xb30 [ 523.904657] ? __pfx_ext4_mkdir+0x10/0x10 [ 523.904695] ? security_inode_permission+0x72/0xe0 [ 523.904735] vfs_mkdir+0x59a/0x8d0 [ 523.904775] do_mkdirat+0x19f/0x3d0 [ 523.904803] ? __pfx_do_mkdirat+0x10/0x10 [ 523.904837] __x64_sys_mkdir+0xf3/0x140 [ 523.904864] do_syscall_64+0xbf/0x360 [ 523.904887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.904912] RIP: 0033:0x7fadd609ac27 [ 523.904945] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 523.904967] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 523.904989] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 523.905004] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 523.905018] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 523.905033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 523.905046] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 523.905078] [ 523.910279] vfat: Unknown parameter 'defcon' [ 523.924440] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:50:03 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 523.974547] FAULT_INJECTION: forcing a failure. [ 523.974547] name failslab, interval 1, probability 0, space 0, times 0 [ 523.975826] CPU: 1 UID: 0 PID: 5667 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 523.975852] Tainted: [W]=WARN [ 523.975856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 523.975866] Call Trace: [ 523.975871] [ 523.975877] dump_stack_lvl+0xfa/0x120 [ 523.975909] should_fail_ex+0x4d7/0x5e0 [ 523.975933] ? __d_alloc+0x31/0xa10 [ 523.975950] should_failslab+0xc2/0x120 [ 523.975972] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 523.975989] ? __d_lookup+0x255/0x490 [ 523.976016] ? __d_alloc+0x31/0xa10 [ 523.976032] __d_alloc+0x31/0xa10 [ 523.976052] d_alloc+0x4a/0x1e0 [ 523.976070] lookup_one_qstr_excl+0x174/0x270 [ 523.976091] ? mnt_want_write+0x153/0x420 [ 523.976115] filename_create+0x1ca/0x480 [ 523.976129] ? __pfx_filename_create+0x10/0x10 [ 523.976142] ? __virt_addr_valid+0x2e8/0x5d0 [ 523.976176] do_mkdirat+0x9a/0x3d0 [ 523.976194] ? __pfx_do_mkdirat+0x10/0x10 [ 523.976217] __x64_sys_mkdir+0xf3/0x140 [ 523.976234] do_syscall_64+0xbf/0x360 [ 523.976250] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 523.976266] RIP: 0033:0x7f52aa14ac27 [ 523.976277] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 523.976292] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 523.976307] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 523.976316] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 523.976325] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 523.976334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 523.976343] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 523.976364] 15:50:03 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) [ 524.037096] SELinux: security_context_str_to_sid () failed with errno=-22 [ 524.132490] vfat: Unknown parameter 'defcont' [ 524.176482] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 15:50:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:13 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:50:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 5) 15:50:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) 15:50:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:13 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 9) 15:50:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 9) 15:50:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 3) [ 533.999483] FAULT_INJECTION: forcing a failure. [ 533.999483] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 534.000907] CPU: 0 UID: 0 PID: 5684 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 534.000934] Tainted: [W]=WARN [ 534.000939] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 534.000948] Call Trace: [ 534.000954] [ 534.000961] dump_stack_lvl+0xfa/0x120 [ 534.000993] should_fail_ex+0x4d7/0x5e0 [ 534.001027] strncpy_from_user+0x3b/0x2f0 [ 534.001055] getname_flags.part.0+0x8d/0x540 [ 534.001082] __x64_sys_mkdir+0xdb/0x140 [ 534.001101] do_syscall_64+0xbf/0x360 [ 534.001117] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.001134] RIP: 0033:0x7f7957b21c27 [ 534.001147] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.001162] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 534.001178] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 534.001189] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 534.001199] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 534.001209] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 534.001218] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 534.001240] [ 534.001661] vfat: Unknown parameter 'defcont' [ 534.032594] vfat: Unknown parameter 'defcont' [ 534.040956] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 534.046606] SELinux: security_context_str_to_sid () failed with errno=-22 [ 534.051292] SELinux: security_context_str_to_sid () failed with errno=-22 [ 534.056026] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:13 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 4) 15:50:13 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:13 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 6) 15:50:13 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 10) 15:50:13 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 10) 15:50:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:13 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 534.200359] FAULT_INJECTION: forcing a failure. [ 534.200359] name failslab, interval 1, probability 0, space 0, times 0 [ 534.202026] CPU: 1 UID: 0 PID: 5699 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 534.202063] Tainted: [W]=WARN [ 534.202071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 534.202086] Call Trace: [ 534.202094] [ 534.202104] dump_stack_lvl+0xfa/0x120 [ 534.202151] should_fail_ex+0x4d7/0x5e0 [ 534.202186] ? __d_alloc+0x31/0xa10 [ 534.202212] should_failslab+0xc2/0x120 [ 534.202239] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 534.202263] ? __d_lookup+0x255/0x490 [ 534.202300] ? __d_alloc+0x31/0xa10 [ 534.202323] __d_alloc+0x31/0xa10 [ 534.202351] d_alloc+0x4a/0x1e0 [ 534.202377] lookup_one_qstr_excl+0x174/0x270 [ 534.202406] ? mnt_want_write+0x153/0x420 [ 534.202440] filename_create+0x1ca/0x480 [ 534.202460] ? __pfx_filename_create+0x10/0x10 [ 534.202479] ? __virt_addr_valid+0x2e8/0x5d0 [ 534.202526] do_mkdirat+0x9a/0x3d0 [ 534.202551] ? __pfx_do_mkdirat+0x10/0x10 [ 534.202584] __x64_sys_mkdir+0xf3/0x140 [ 534.202608] do_syscall_64+0xbf/0x360 [ 534.202630] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.202652] RIP: 0033:0x7f7957b21c27 [ 534.202669] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.202697] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 534.202718] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 534.202732] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 534.202745] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 534.202759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 534.202772] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 534.202801] [ 534.203975] vfat: Unknown parameter 'defcont' [ 534.241872] vfat: Unknown parameter 'defcont' [ 534.257553] vfat: Unknown parameter 'defcont' [ 534.258522] FAULT_INJECTION: forcing a failure. [ 534.258522] name failslab, interval 1, probability 0, space 0, times 0 [ 534.260341] CPU: 1 UID: 0 PID: 5709 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 534.260376] Tainted: [W]=WARN [ 534.260383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 534.260398] Call Trace: [ 534.260405] [ 534.260414] dump_stack_lvl+0xfa/0x120 [ 534.260453] should_fail_ex+0x4d7/0x5e0 [ 534.260481] ? ext4_alloc_inode+0x28/0x600 [ 534.260509] should_failslab+0xc2/0x120 [ 534.260534] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 534.260563] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 534.260593] ? ext4_alloc_inode+0x28/0x600 [ 534.260619] ext4_alloc_inode+0x28/0x600 [ 534.260646] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 534.260672] alloc_inode+0x67/0x250 [ 534.260708] new_inode+0x1e/0x160 [ 534.260738] __ext4_new_inode+0x35d/0x4d70 [ 534.260771] ? avc_has_perm_noaudit+0x150/0x3d0 [ 534.260810] ? __pfx___ext4_new_inode+0x10/0x10 [ 534.260837] ? __pfx_avc_has_perm+0x10/0x10 [ 534.260870] ? __pfx___dquot_initialize+0x10/0x10 [ 534.260912] ext4_mkdir+0x331/0xb30 [ 534.260951] ? __pfx_ext4_mkdir+0x10/0x10 [ 534.260980] ? security_inode_permission+0x72/0xe0 [ 534.261030] vfs_mkdir+0x59a/0x8d0 [ 534.261067] do_mkdirat+0x19f/0x3d0 [ 534.261092] ? __pfx_do_mkdirat+0x10/0x10 [ 534.261125] __x64_sys_mkdir+0xf3/0x140 [ 534.261150] do_syscall_64+0xbf/0x360 [ 534.261171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.261193] RIP: 0033:0x7f52aa14ac27 [ 534.261210] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.261230] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 534.261252] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 534.261266] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 534.261279] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 534.261292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 534.261305] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 534.261334] [ 534.293936] FAULT_INJECTION: forcing a failure. [ 534.293936] name failslab, interval 1, probability 0, space 0, times 0 [ 534.298140] CPU: 1 UID: 0 PID: 5710 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 534.298175] Tainted: [W]=WARN [ 534.298182] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 534.298194] Call Trace: [ 534.298201] [ 534.298209] dump_stack_lvl+0xfa/0x120 [ 534.298244] should_fail_ex+0x4d7/0x5e0 [ 534.298271] ? jbd2__journal_start+0x193/0x6b0 [ 534.298301] should_failslab+0xc2/0x120 [ 534.298326] kmem_cache_alloc_noprof+0x72/0x690 [ 534.298348] ? lock_is_held_type+0x9e/0x120 [ 534.298379] ? lock_is_held_type+0x9e/0x120 [ 534.298414] ? jbd2__journal_start+0x193/0x6b0 [ 534.298444] jbd2__journal_start+0x193/0x6b0 [ 534.298480] __ext4_journal_start_sb+0x325/0x5d0 [ 534.298511] __ext4_new_inode+0x2cbe/0x4d70 [ 534.298551] ? __pfx___ext4_new_inode+0x10/0x10 [ 534.298578] ? __pfx_avc_has_perm+0x10/0x10 [ 534.298611] ? __pfx___dquot_initialize+0x10/0x10 [ 534.298652] ext4_mkdir+0x331/0xb30 [ 534.298699] ? __pfx_ext4_mkdir+0x10/0x10 [ 534.298728] ? security_inode_permission+0x72/0xe0 [ 534.298766] vfs_mkdir+0x59a/0x8d0 [ 534.298802] do_mkdirat+0x19f/0x3d0 [ 534.298828] ? __pfx_do_mkdirat+0x10/0x10 [ 534.298860] __x64_sys_mkdir+0xf3/0x140 [ 534.298885] do_syscall_64+0xbf/0x360 [ 534.298906] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 534.298927] RIP: 0033:0x7fadd609ac27 [ 534.298943] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 534.298964] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 534.298985] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 534.298998] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 534.299011] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 534.299025] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 534.299037] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 534.299067] [ 534.327886] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 534.335089] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:13 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:13 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:14 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 5) 15:50:14 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 534.378982] vfat: Unknown parameter 'defcont' 15:50:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext', @ANYBLOB]) [ 534.409895] vfat: Unknown parameter 'defcont' [ 534.419106] SELinux: security_context_str_to_sid () failed with errno=-22 [ 534.473962] vfat: Unknown parameter 'defcont' 15:50:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 7) 15:50:23 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:50:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:50:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 6) 15:50:23 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 11) 15:50:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 11) 15:50:23 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 543.892668] SELinux: security_context_str_to_sid () failed with errno=-22 [ 543.894532] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:23 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 12) [ 543.914544] SELinux: security_context_str_to_sid () failed with errno=-22 [ 543.917230] FAULT_INJECTION: forcing a failure. [ 543.917230] name failslab, interval 1, probability 0, space 0, times 0 [ 543.918207] CPU: 1 UID: 0 PID: 5745 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 543.918226] Tainted: [W]=WARN [ 543.918230] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 543.918237] Call Trace: [ 543.918241] [ 543.918245] dump_stack_lvl+0xfa/0x120 [ 543.918270] should_fail_ex+0x4d7/0x5e0 [ 543.918287] ? ext4_alloc_inode+0x28/0x600 [ 543.918303] should_failslab+0xc2/0x120 [ 543.918318] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 543.918335] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 543.918351] ? ext4_alloc_inode+0x28/0x600 [ 543.918365] ext4_alloc_inode+0x28/0x600 [ 543.918380] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 543.918394] alloc_inode+0x67/0x250 [ 543.918410] new_inode+0x1e/0x160 [ 543.918426] __ext4_new_inode+0x35d/0x4d70 [ 543.918444] ? avc_has_perm_noaudit+0x150/0x3d0 [ 543.918466] ? __pfx___ext4_new_inode+0x10/0x10 [ 543.918481] ? __pfx_avc_has_perm+0x10/0x10 [ 543.918498] ? __pfx___dquot_initialize+0x10/0x10 [ 543.918522] ext4_mkdir+0x331/0xb30 [ 543.918543] ? __pfx_ext4_mkdir+0x10/0x10 [ 543.918559] ? security_inode_permission+0x72/0xe0 [ 543.918580] vfs_mkdir+0x59a/0x8d0 [ 543.918600] do_mkdirat+0x19f/0x3d0 [ 543.918614] ? __pfx_do_mkdirat+0x10/0x10 [ 543.918632] __x64_sys_mkdir+0xf3/0x140 [ 543.918645] do_syscall_64+0xbf/0x360 [ 543.918658] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.918670] RIP: 0033:0x7f7957b21c27 [ 543.918684] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.918696] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 543.918708] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 543.918715] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 543.918722] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 543.918729] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 543.918736] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 543.918752] [ 543.929828] vfat: Unknown parameter 'defcont' [ 543.938947] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 543.961372] vfat: Bad value for 'defcontext' 15:50:23 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 12) [ 543.985379] FAULT_INJECTION: forcing a failure. [ 543.985379] name failslab, interval 1, probability 0, space 0, times 0 [ 543.986595] CPU: 1 UID: 0 PID: 5749 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 543.986615] Tainted: [W]=WARN [ 543.986619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 543.986627] Call Trace: [ 543.986631] [ 543.986636] dump_stack_lvl+0xfa/0x120 [ 543.986659] should_fail_ex+0x4d7/0x5e0 [ 543.986681] should_failslab+0xc2/0x120 [ 543.986696] __kmalloc_noprof+0xc8/0x6e0 [ 543.986714] ? current_umask+0x12/0x80 [ 543.986728] ? posix_acl_create.part.0+0x2a0/0x480 [ 543.986746] ? security_inode_init_security+0x13d/0x390 [ 543.986764] ? security_inode_init_security+0x13d/0x390 [ 543.986778] security_inode_init_security+0x13d/0x390 [ 543.986792] ? __pfx_ext4_initxattrs+0x10/0x10 [ 543.986809] ? __pfx_security_inode_init_security+0x10/0x10 [ 543.986825] ? crc32c+0x1ae/0x350 [ 543.986839] __ext4_new_inode+0x3452/0x4d70 [ 543.986862] ? __pfx___ext4_new_inode+0x10/0x10 [ 543.986878] ? __pfx___dquot_initialize+0x10/0x10 [ 543.986900] ext4_mkdir+0x331/0xb30 [ 543.986922] ? __pfx_ext4_mkdir+0x10/0x10 [ 543.986937] ? security_inode_permission+0x72/0xe0 [ 543.986958] vfs_mkdir+0x59a/0x8d0 [ 543.986979] do_mkdirat+0x19f/0x3d0 [ 543.986993] ? __pfx_do_mkdirat+0x10/0x10 [ 543.987010] __x64_sys_mkdir+0xf3/0x140 [ 543.987024] do_syscall_64+0xbf/0x360 [ 543.987036] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 543.987048] RIP: 0033:0x7fadd609ac27 [ 543.987057] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 543.987069] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 543.987081] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 543.987089] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 543.987096] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 543.987103] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 543.987110] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 543.987126] 15:50:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:50:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 7) 15:50:23 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 544.015310] FAULT_INJECTION: forcing a failure. [ 544.015310] name failslab, interval 1, probability 0, space 0, times 0 [ 544.016321] CPU: 1 UID: 0 PID: 5751 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 544.016343] Tainted: [W]=WARN [ 544.016347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 544.016355] Call Trace: [ 544.016359] [ 544.016363] dump_stack_lvl+0xfa/0x120 [ 544.016384] should_fail_ex+0x4d7/0x5e0 [ 544.016400] should_failslab+0xc2/0x120 [ 544.016415] __kmalloc_noprof+0xc8/0x6e0 [ 544.016432] ? current_umask+0x12/0x80 [ 544.016445] ? posix_acl_create.part.0+0x2a0/0x480 [ 544.016463] ? security_inode_init_security+0x13d/0x390 [ 544.016481] ? security_inode_init_security+0x13d/0x390 [ 544.016495] security_inode_init_security+0x13d/0x390 [ 544.016509] ? __pfx_ext4_initxattrs+0x10/0x10 [ 544.016526] ? __pfx_security_inode_init_security+0x10/0x10 [ 544.016542] ? crc32c+0x1ae/0x350 [ 544.016556] __ext4_new_inode+0x3452/0x4d70 [ 544.016578] ? __pfx___ext4_new_inode+0x10/0x10 [ 544.016594] ? __pfx___dquot_initialize+0x10/0x10 [ 544.016616] ext4_mkdir+0x331/0xb30 [ 544.016637] ? __pfx_ext4_mkdir+0x10/0x10 [ 544.016653] ? security_inode_permission+0x72/0xe0 [ 544.016673] vfs_mkdir+0x59a/0x8d0 [ 544.016693] do_mkdirat+0x19f/0x3d0 [ 544.016708] ? __pfx_do_mkdirat+0x10/0x10 [ 544.016725] __x64_sys_mkdir+0xf3/0x140 [ 544.016739] do_syscall_64+0xbf/0x360 [ 544.016751] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 544.016763] RIP: 0033:0x7f4dc31f3c27 [ 544.016772] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 544.016783] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 544.016794] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 544.016802] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 544.016809] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 544.016816] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 544.016823] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 544.016839] [ 544.110888] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 544.142147] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 8) 15:50:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:50:32 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 8) 15:50:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 13) 15:50:32 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 15:50:32 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 13) 15:50:32 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:50:32 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 553.221071] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 553.222269] FAULT_INJECTION: forcing a failure. [ 553.222269] name failslab, interval 1, probability 0, space 0, times 0 [ 553.223724] CPU: 1 UID: 0 PID: 5774 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 553.223754] Tainted: [W]=WARN [ 553.223760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 553.223771] Call Trace: [ 553.223778] [ 553.223785] dump_stack_lvl+0xfa/0x120 [ 553.223820] should_fail_ex+0x4d7/0x5e0 [ 553.223846] ? security_inode_alloc+0x3e/0x130 [ 553.223870] should_failslab+0xc2/0x120 [ 553.223894] kmem_cache_alloc_noprof+0x72/0x690 [ 553.223913] ? __pfx_map_id_range_down+0x10/0x10 [ 553.223942] ? security_inode_alloc+0x3e/0x130 [ 553.223965] security_inode_alloc+0x3e/0x130 [ 553.223990] inode_init_always_gfp+0xc94/0xff0 [ 553.224014] alloc_inode+0x8d/0x250 [ 553.224038] new_inode+0x1e/0x160 [ 553.224063] __ext4_new_inode+0x35d/0x4d70 [ 553.224092] ? avc_has_perm_noaudit+0x150/0x3d0 [ 553.224125] ? __pfx___ext4_new_inode+0x10/0x10 [ 553.224148] ? __pfx_avc_has_perm+0x10/0x10 [ 553.224177] ? __pfx___dquot_initialize+0x10/0x10 [ 553.224212] ext4_mkdir+0x331/0xb30 [ 553.224246] ? __pfx_ext4_mkdir+0x10/0x10 [ 553.224270] ? security_inode_permission+0x72/0xe0 [ 553.224303] vfs_mkdir+0x59a/0x8d0 [ 553.224334] do_mkdirat+0x19f/0x3d0 [ 553.224357] ? __pfx_do_mkdirat+0x10/0x10 [ 553.224384] __x64_sys_mkdir+0xf3/0x140 [ 553.224406] do_syscall_64+0xbf/0x360 [ 553.224424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.224443] RIP: 0033:0x7f7957b21c27 [ 553.224458] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.224475] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 553.224493] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 553.224505] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 553.224516] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 553.224528] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 553.224539] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 553.224564] [ 553.236237] vfat: Bad value for 'defcontext' [ 553.258225] FAULT_INJECTION: forcing a failure. [ 553.258225] name failslab, interval 1, probability 0, space 0, times 0 [ 553.260075] CPU: 0 UID: 0 PID: 5778 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 553.260111] Tainted: [W]=WARN [ 553.260119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 553.260132] Call Trace: [ 553.260139] [ 553.260147] dump_stack_lvl+0xfa/0x120 [ 553.260187] should_fail_ex+0x4d7/0x5e0 [ 553.260217] ? security_inode_alloc+0x3e/0x130 [ 553.260246] should_failslab+0xc2/0x120 [ 553.260273] kmem_cache_alloc_noprof+0x72/0x690 [ 553.260296] ? __pfx_map_id_range_down+0x10/0x10 [ 553.260332] ? security_inode_alloc+0x3e/0x130 [ 553.260360] security_inode_alloc+0x3e/0x130 [ 553.260391] inode_init_always_gfp+0xc94/0xff0 [ 553.260419] alloc_inode+0x8d/0x250 [ 553.260448] new_inode+0x1e/0x160 [ 553.260479] __ext4_new_inode+0x35d/0x4d70 [ 553.260514] ? avc_has_perm_noaudit+0x150/0x3d0 [ 553.260555] ? __pfx___ext4_new_inode+0x10/0x10 [ 553.260583] ? __pfx_avc_has_perm+0x10/0x10 [ 553.260618] ? __pfx___dquot_initialize+0x10/0x10 [ 553.260661] ext4_mkdir+0x331/0xb30 [ 553.260714] ? __pfx_ext4_mkdir+0x10/0x10 [ 553.260743] ? security_inode_permission+0x72/0xe0 [ 553.260783] vfs_mkdir+0x59a/0x8d0 [ 553.260821] do_mkdirat+0x19f/0x3d0 [ 553.260848] ? __pfx_do_mkdirat+0x10/0x10 [ 553.260882] __x64_sys_mkdir+0xf3/0x140 [ 553.260908] do_syscall_64+0xbf/0x360 [ 553.260930] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.260953] RIP: 0033:0x7f52aa14ac27 [ 553.260971] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.260993] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 553.261015] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 553.261030] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 553.261043] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 553.261057] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 553.261070] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 553.261102] [ 553.269980] vfat: Bad value for 'defcontext' [ 553.271916] SELinux: security_context_str_to_sid () failed with errno=-22 [ 553.282285] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:32 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysa']) 15:50:32 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 9) 15:50:32 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 14) 15:50:33 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 9) 15:50:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 553.410040] SELinux: security_context_str_to_sid (sysa) failed with errno=-22 15:50:33 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:50:33 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 14) [ 553.414439] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:33 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 553.456020] vfat: Bad value for 'defcontext' [ 553.463163] SELinux: security_context_str_to_sid () failed with errno=-22 [ 553.483967] FAULT_INJECTION: forcing a failure. [ 553.483967] name failslab, interval 1, probability 0, space 0, times 0 [ 553.485797] CPU: 0 UID: 0 PID: 5789 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 553.485835] Tainted: [W]=WARN [ 553.485843] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 553.485856] Call Trace: [ 553.485864] [ 553.485873] dump_stack_lvl+0xfa/0x120 [ 553.485915] should_fail_ex+0x4d7/0x5e0 [ 553.485948] ? security_inode_alloc+0x3e/0x130 [ 553.485977] should_failslab+0xc2/0x120 [ 553.486006] kmem_cache_alloc_noprof+0x72/0x690 [ 553.486030] ? __pfx_map_id_range_down+0x10/0x10 [ 553.486067] ? security_inode_alloc+0x3e/0x130 [ 553.486095] security_inode_alloc+0x3e/0x130 [ 553.486127] inode_init_always_gfp+0xc94/0xff0 [ 553.486157] alloc_inode+0x8d/0x250 [ 553.486187] new_inode+0x1e/0x160 [ 553.486219] __ext4_new_inode+0x35d/0x4d70 [ 553.486255] ? avc_has_perm_noaudit+0x150/0x3d0 [ 553.486297] ? __pfx___ext4_new_inode+0x10/0x10 [ 553.486325] ? __pfx_avc_has_perm+0x10/0x10 [ 553.486361] ? __pfx___dquot_initialize+0x10/0x10 [ 553.486406] ext4_mkdir+0x331/0xb30 [ 553.486448] ? __pfx_ext4_mkdir+0x10/0x10 [ 553.486478] ? security_inode_permission+0x72/0xe0 [ 553.486518] vfs_mkdir+0x59a/0x8d0 [ 553.486558] do_mkdirat+0x19f/0x3d0 [ 553.486585] ? __pfx_do_mkdirat+0x10/0x10 [ 553.486620] __x64_sys_mkdir+0xf3/0x140 [ 553.486647] do_syscall_64+0xbf/0x360 [ 553.486670] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.486701] RIP: 0033:0x7f52aa14ac27 [ 553.486719] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.486741] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 553.486764] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 553.486779] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 553.486793] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 553.486807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 553.486821] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 553.486852] [ 553.532371] FAULT_INJECTION: forcing a failure. [ 553.532371] name failslab, interval 1, probability 0, space 0, times 0 [ 553.533745] CPU: 1 UID: 0 PID: 5791 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) 15:50:33 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysa']) 15:50:33 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 10) 15:50:33 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) [ 553.533769] Tainted: [W]=WARN [ 553.533774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 553.533783] Call Trace: [ 553.533789] [ 553.533795] dump_stack_lvl+0xfa/0x120 [ 553.533826] should_fail_ex+0x4d7/0x5e0 [ 553.533848] should_failslab+0xc2/0x120 [ 553.533868] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 553.533885] ? lock_acquire+0x15e/0x2f0 [ 553.533903] ? sidtab_sid2str_get+0x85/0x6f0 [ 553.533923] ? sidtab_sid2str_get+0x17e/0x6f0 [ 553.533947] ? kmemdup_noprof+0x2b/0x60 [ 553.533971] kmemdup_noprof+0x2b/0x60 [ 553.533994] sidtab_sid2str_get+0x17e/0x6f0 [ 553.534017] sidtab_entry_to_string+0x33/0x110 [ 553.534038] security_sid_to_context_core+0x350/0x620 [ 553.534060] selinux_inode_init_security+0x433/0x650 [ 553.534084] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 553.534103] ? trace_kmalloc+0x1f/0xb0 [ 553.534122] ? current_umask+0x12/0x80 [ 553.534139] ? security_inode_init_security+0x13d/0x390 [ 553.534163] security_inode_init_security+0x1e6/0x390 [ 553.534181] ? __pfx_ext4_initxattrs+0x10/0x10 [ 553.534203] ? __pfx_security_inode_init_security+0x10/0x10 [ 553.534224] ? crc32c+0x1ae/0x350 [ 553.534242] __ext4_new_inode+0x3452/0x4d70 [ 553.534270] ? __pfx___ext4_new_inode+0x10/0x10 [ 553.534290] ? __pfx___dquot_initialize+0x10/0x10 [ 553.534320] ext4_mkdir+0x331/0xb30 [ 553.534348] ? __pfx_ext4_mkdir+0x10/0x10 [ 553.534368] ? security_inode_permission+0x72/0xe0 [ 553.534394] vfs_mkdir+0x59a/0x8d0 [ 553.534420] do_mkdirat+0x19f/0x3d0 [ 553.534437] ? __pfx_do_mkdirat+0x10/0x10 [ 553.534460] __x64_sys_mkdir+0xf3/0x140 [ 553.534478] do_syscall_64+0xbf/0x360 [ 553.534493] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.534509] RIP: 0033:0x7f4dc31f3c27 [ 553.534520] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.534535] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 553.534550] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 553.534560] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 553.534569] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 553.534577] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 553.534586] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 553.534607] [ 553.538392] vfat: Bad value for 'defcontext' [ 553.555619] FAULT_INJECTION: forcing a failure. [ 553.555619] name failslab, interval 1, probability 0, space 0, times 0 [ 553.571106] CPU: 1 UID: 0 PID: 5796 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 553.571130] Tainted: [W]=WARN [ 553.571135] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 553.571144] Call Trace: [ 553.571149] [ 553.571155] dump_stack_lvl+0xfa/0x120 [ 553.571182] should_fail_ex+0x4d7/0x5e0 [ 553.571203] ? jbd2__journal_start+0x193/0x6b0 [ 553.571224] should_failslab+0xc2/0x120 [ 553.571242] kmem_cache_alloc_noprof+0x72/0x690 [ 553.571258] ? lock_is_held_type+0x9e/0x120 [ 553.571279] ? lock_is_held_type+0x9e/0x120 [ 553.571302] ? jbd2__journal_start+0x193/0x6b0 [ 553.571323] jbd2__journal_start+0x193/0x6b0 [ 553.571346] __ext4_journal_start_sb+0x325/0x5d0 [ 553.571368] __ext4_new_inode+0x2cbe/0x4d70 [ 553.571396] ? __pfx___ext4_new_inode+0x10/0x10 [ 553.571414] ? __pfx_avc_has_perm+0x10/0x10 [ 553.571437] ? __pfx___dquot_initialize+0x10/0x10 [ 553.571466] ext4_mkdir+0x331/0xb30 [ 553.571492] ? __pfx_ext4_mkdir+0x10/0x10 [ 553.571512] ? security_inode_permission+0x72/0xe0 [ 553.571538] vfs_mkdir+0x59a/0x8d0 [ 553.571563] do_mkdirat+0x19f/0x3d0 [ 553.571581] ? __pfx_do_mkdirat+0x10/0x10 [ 553.571603] __x64_sys_mkdir+0xf3/0x140 [ 553.571619] do_syscall_64+0xbf/0x360 [ 553.571634] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 553.571649] RIP: 0033:0x7f7957b21c27 [ 553.571661] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 553.571680] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 553.571694] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 553.571704] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 553.571712] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 553.571721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 553.571730] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 553.571750] [ 553.590943] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 553.623121] No source specified [ 553.643125] vfat: Bad value for 'defcontext' [ 553.675830] SELinux: security_context_str_to_sid (sysa) failed with errno=-22 15:50:42 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:50:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 15) 15:50:42 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 15) 15:50:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:50:42 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:50:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 11) 15:50:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 10) 15:50:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sy']) [ 562.859939] FAULT_INJECTION: forcing a failure. [ 562.859939] name failslab, interval 1, probability 0, space 0, times 0 [ 562.860879] CPU: 1 UID: 0 PID: 5818 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 562.860898] Tainted: [W]=WARN [ 562.860902] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 562.860909] Call Trace: [ 562.860914] [ 562.860918] dump_stack_lvl+0xfa/0x120 [ 562.860942] should_fail_ex+0x4d7/0x5e0 [ 562.860960] ? jbd2__journal_start+0x193/0x6b0 [ 562.860977] should_failslab+0xc2/0x120 [ 562.860992] kmem_cache_alloc_noprof+0x72/0x690 [ 562.861005] ? lock_is_held_type+0x9e/0x120 [ 562.861022] ? lock_is_held_type+0x9e/0x120 [ 562.861041] ? jbd2__journal_start+0x193/0x6b0 [ 562.861057] jbd2__journal_start+0x193/0x6b0 [ 562.861076] __ext4_journal_start_sb+0x325/0x5d0 [ 562.861093] __ext4_new_inode+0x2cbe/0x4d70 [ 562.861116] ? __pfx___ext4_new_inode+0x10/0x10 [ 562.861130] ? __pfx_avc_has_perm+0x10/0x10 [ 562.861150] ? __pfx___dquot_initialize+0x10/0x10 [ 562.861173] ext4_mkdir+0x331/0xb30 [ 562.861194] ? __pfx_ext4_mkdir+0x10/0x10 [ 562.861210] ? security_inode_permission+0x72/0xe0 [ 562.861231] vfs_mkdir+0x59a/0x8d0 [ 562.861252] do_mkdirat+0x19f/0x3d0 [ 562.861265] ? __pfx_do_mkdirat+0x10/0x10 [ 562.861283] __x64_sys_mkdir+0xf3/0x140 [ 562.861309] do_syscall_64+0xbf/0x360 [ 562.861321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 562.861333] RIP: 0033:0x7f52aa14ac27 [ 562.861342] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 562.861353] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 562.861365] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 562.861373] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 562.861380] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 562.861387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 562.861394] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 562.861410] [ 562.861415] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 562.881683] No source specified [ 562.885392] SELinux: security_context_str_to_sid () failed with errno=-22 [ 562.893651] SELinux: security_context_str_to_sid () failed with errno=-22 [ 562.899927] FAULT_INJECTION: forcing a failure. [ 562.899927] name failslab, interval 1, probability 0, space 0, times 0 [ 562.901716] CPU: 0 UID: 0 PID: 5822 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 562.901752] Tainted: [W]=WARN [ 562.901760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 562.901773] Call Trace: [ 562.901780] [ 562.901789] dump_stack_lvl+0xfa/0x120 [ 562.901835] should_fail_ex+0x4d7/0x5e0 [ 562.901866] ? jbd2__journal_start+0x193/0x6b0 [ 562.901899] should_failslab+0xc2/0x120 [ 562.901927] kmem_cache_alloc_noprof+0x72/0x690 [ 562.901951] ? lock_is_held_type+0x9e/0x120 [ 562.901983] ? lock_is_held_type+0x9e/0x120 [ 562.902017] ? jbd2__journal_start+0x193/0x6b0 [ 562.902047] ? __cond_resched+0x4c/0x80 [ 562.902074] jbd2__journal_start+0x193/0x6b0 [ 562.902110] __ext4_journal_start_sb+0x325/0x5d0 [ 562.902142] __ext4_new_inode+0x2cbe/0x4d70 [ 562.902183] ? __pfx___ext4_new_inode+0x10/0x10 [ 562.902210] ? __pfx_avc_has_perm+0x10/0x10 [ 562.902245] ? __pfx___dquot_initialize+0x10/0x10 [ 562.902288] ext4_mkdir+0x331/0xb30 [ 562.902329] ? __pfx_ext4_mkdir+0x10/0x10 [ 562.902357] ? security_inode_permission+0x72/0xe0 [ 562.902398] vfs_mkdir+0x59a/0x8d0 [ 562.902436] do_mkdirat+0x19f/0x3d0 [ 562.902462] ? __pfx_do_mkdirat+0x10/0x10 [ 562.902495] __x64_sys_mkdir+0xf3/0x140 [ 562.902519] do_syscall_64+0xbf/0x360 [ 562.902542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 562.902565] RIP: 0033:0x7f7957b21c27 15:50:42 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 562.902582] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 562.902603] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 562.902625] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 562.902639] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 562.902653] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 562.902666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 562.902686] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 562.902717] [ 562.931033] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory 15:50:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 16) [ 562.938881] SELinux: security_context_str_to_sid () failed with errno=-22 [ 562.941493] SELinux: security_context_str_to_sid (sy) failed with errno=-22 [ 562.955443] vfat: Bad value for 'defcontext' [ 562.964441] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:42 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 17) [ 562.993632] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:42 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 11) 15:50:42 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 12) [ 563.104359] SELinux: security_context_str_to_sid () failed with errno=-22 [ 563.111276] SELinux: security_context_str_to_sid () failed with errno=-22 [ 563.164194] FAULT_INJECTION: forcing a failure. [ 563.164194] name failslab, interval 1, probability 0, space 0, times 0 [ 563.166528] CPU: 0 UID: 0 PID: 5838 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 563.166570] Tainted: [W]=WARN [ 563.166579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 563.166594] Call Trace: [ 563.166603] [ 563.166612] dump_stack_lvl+0xfa/0x120 [ 563.166661] should_fail_ex+0x4d7/0x5e0 [ 563.166706] should_failslab+0xc2/0x120 [ 563.166738] __kmalloc_noprof+0xc8/0x6e0 [ 563.166775] ? current_umask+0x12/0x80 [ 563.166805] ? posix_acl_create.part.0+0x2a0/0x480 [ 563.166845] ? security_inode_init_security+0x13d/0x390 [ 563.166883] ? security_inode_init_security+0x13d/0x390 [ 563.166915] security_inode_init_security+0x13d/0x390 [ 563.166947] ? __pfx_ext4_initxattrs+0x10/0x10 [ 563.166984] ? __pfx_security_inode_init_security+0x10/0x10 [ 563.167019] ? crc32c+0x1ae/0x350 [ 563.167049] __ext4_new_inode+0x3452/0x4d70 [ 563.167096] ? __pfx___ext4_new_inode+0x10/0x10 [ 563.167131] ? __pfx___dquot_initialize+0x10/0x10 [ 563.167180] ext4_mkdir+0x331/0xb30 [ 563.167227] ? __pfx_ext4_mkdir+0x10/0x10 [ 563.167261] ? security_inode_permission+0x72/0xe0 [ 563.167307] vfs_mkdir+0x59a/0x8d0 [ 563.167351] do_mkdirat+0x19f/0x3d0 [ 563.167381] ? __pfx_do_mkdirat+0x10/0x10 [ 563.167420] __x64_sys_mkdir+0xf3/0x140 [ 563.167449] do_syscall_64+0xbf/0x360 [ 563.167475] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 563.167502] RIP: 0033:0x7f7957b21c27 [ 563.167522] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 563.167546] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 563.167571] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 563.167588] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 563.167603] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 563.167619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 563.167634] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 563.167670] 15:50:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 13) 15:50:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:50:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 12) 15:50:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[]) 15:50:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 16) 15:50:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:50:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:50:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 18) [ 571.241628] FAULT_INJECTION: forcing a failure. [ 571.241628] name failslab, interval 1, probability 0, space 0, times 0 [ 571.243087] CPU: 0 UID: 0 PID: 5852 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 571.243113] Tainted: [W]=WARN [ 571.243119] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 571.243130] Call Trace: [ 571.243136] [ 571.243142] dump_stack_lvl+0xfa/0x120 [ 571.243176] should_fail_ex+0x4d7/0x5e0 [ 571.243200] ? __es_insert_extent+0xed2/0x1370 [ 571.243225] should_failslab+0xc2/0x120 [ 571.243246] kmem_cache_alloc_noprof+0x72/0x690 [ 571.243271] ? __es_insert_extent+0xed2/0x1370 [ 571.243294] __es_insert_extent+0xed2/0x1370 [ 571.243320] ? __pfx_do_raw_write_lock+0x10/0x10 [ 571.243352] ext4_es_insert_extent+0x4d0/0x1100 [ 571.243385] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 571.243415] ? lock_acquire+0x15e/0x2f0 [ 571.243440] ? find_held_lock+0x2b/0x80 [ 571.243477] ? ext4_es_find_extent_range+0x1cf/0x510 [ 571.243503] ? lock_release+0xc8/0x290 [ 571.243523] ? do_raw_read_unlock+0x44/0xe0 [ 571.243551] ext4_ext_map_blocks+0x178d/0x5f70 [ 571.243580] ? lock_acquire+0x15e/0x2f0 [ 571.243598] ? fs_reclaim_acquire+0xae/0x150 [ 571.243618] ? lock_is_held_type+0x9e/0x120 [ 571.243649] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 571.243670] ? bdev_getblk+0x84/0xf0 [ 571.243698] ? crc32c+0x1ae/0x350 [ 571.243716] ? look_up_lock_class+0x56/0x150 [ 571.243740] ? register_lock_class+0x41/0x560 [ 571.243762] ? __lock_acquire+0xc65/0x1b70 [ 571.243790] ? lock_acquire+0x15e/0x2f0 [ 571.243808] ? ext4_map_blocks+0x49f/0x14a0 [ 571.243829] ext4_map_query_blocks+0x117/0x890 [ 571.243855] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 571.243880] ? __pfx_down_read+0x10/0x10 [ 571.243895] ? ext4_es_lookup_extent+0xc8/0xb30 [ 571.243927] ext4_map_blocks+0x4b3/0x14a0 [ 571.243948] ? __pfx_ext4_map_blocks+0x10/0x10 [ 571.243964] ? __pfx_ext4_initxattrs+0x10/0x10 [ 571.243987] ? __pfx_security_inode_init_security+0x10/0x10 [ 571.244011] ? crc32c+0x1ae/0x350 [ 571.244027] ? __brelse+0x7f/0xa0 [ 571.244051] ? __ext4_new_inode+0x116/0x4d70 [ 571.244073] ext4_append+0x1b6/0x530 [ 571.244095] ? __pfx_ext4_append+0x10/0x10 [ 571.244116] ? __pfx___ext4_new_inode+0x10/0x10 [ 571.244141] ext4_init_new_dir+0x13c/0x240 [ 571.244163] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 571.244194] ext4_mkdir+0x3c5/0xb30 [ 571.244220] ? __pfx_ext4_mkdir+0x10/0x10 [ 571.244242] ? security_inode_permission+0x72/0xe0 [ 571.244271] vfs_mkdir+0x59a/0x8d0 [ 571.244300] do_mkdirat+0x19f/0x3d0 [ 571.244320] ? __pfx_do_mkdirat+0x10/0x10 [ 571.244345] __x64_sys_mkdir+0xf3/0x140 [ 571.244364] do_syscall_64+0xbf/0x360 [ 571.244381] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 571.244398] RIP: 0033:0x7fadd609ac27 [ 571.244411] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.244418] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.244432] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 571.244456] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 571.244473] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 571.244489] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 571.244504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 571.244514] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 571.244539] [ 571.245302] No source specified [ 571.250596] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.254355] FAULT_INJECTION: forcing a failure. [ 571.254355] name failslab, interval 1, probability 0, space 0, times 0 [ 571.254874] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.255127] CPU: 0 UID: 0 PID: 5859 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 571.255155] Tainted: [W]=WARN [ 571.255162] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 571.255172] Call Trace: [ 571.255179] [ 571.255186] dump_stack_lvl+0xfa/0x120 [ 571.255211] should_fail_ex+0x4d7/0x5e0 [ 571.255234] should_failslab+0xc2/0x120 [ 571.255253] __kmalloc_noprof+0xc8/0x6e0 [ 571.255277] ? current_umask+0x12/0x80 [ 571.255295] ? posix_acl_create.part.0+0x2a0/0x480 [ 571.255322] ? security_inode_init_security+0x13d/0x390 [ 571.255345] ? security_inode_init_security+0x13d/0x390 [ 571.255363] security_inode_init_security+0x13d/0x390 [ 571.255383] ? __pfx_ext4_initxattrs+0x10/0x10 [ 571.255406] ? __pfx_security_inode_init_security+0x10/0x10 [ 571.255431] ? crc32c+0x1ae/0x350 [ 571.255458] __ext4_new_inode+0x3452/0x4d70 [ 571.255504] ? __pfx___ext4_new_inode+0x10/0x10 [ 571.255530] ? __pfx___dquot_initialize+0x10/0x10 [ 571.255563] ext4_mkdir+0x331/0xb30 [ 571.255593] ? __pfx_ext4_mkdir+0x10/0x10 [ 571.255615] ? security_inode_permission+0x72/0xe0 [ 571.255643] vfs_mkdir+0x59a/0x8d0 [ 571.255670] do_mkdirat+0x19f/0x3d0 [ 571.255697] ? __pfx_do_mkdirat+0x10/0x10 [ 571.255721] __x64_sys_mkdir+0xf3/0x140 [ 571.255740] do_syscall_64+0xbf/0x360 [ 571.255756] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 571.255772] RIP: 0033:0x7f52aa14ac27 [ 571.255785] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.255800] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 571.255816] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 571.255827] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 571.255838] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 571.255848] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 571.255858] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 571.255881] [ 571.256233] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.265394] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.266731] FAULT_INJECTION: forcing a failure. [ 571.266731] name failslab, interval 1, probability 0, space 0, times 0 [ 571.316903] CPU: 1 UID: 0 PID: 5856 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 571.316932] Tainted: [W]=WARN [ 571.316938] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 571.316948] Call Trace: [ 571.316955] [ 571.316962] dump_stack_lvl+0xfa/0x120 [ 571.316995] should_fail_ex+0x4d7/0x5e0 [ 571.317021] should_failslab+0xc2/0x120 [ 571.317043] __kmalloc_noprof+0xc8/0x6e0 [ 571.317068] ? find_held_lock+0x2b/0x80 [ 571.317095] ? ext4_find_extent+0x7f5/0xa00 [ 571.317124] ? ext4_find_extent+0x7f5/0xa00 [ 571.317145] ext4_find_extent+0x7f5/0xa00 [ 571.317173] ext4_ext_map_blocks+0x1cc/0x5f70 [ 571.317203] ? lock_acquire+0x15e/0x2f0 [ 571.317222] ? fs_reclaim_acquire+0xae/0x150 [ 571.317244] ? lock_is_held_type+0x9e/0x120 [ 571.317277] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 571.317300] ? bdev_getblk+0x84/0xf0 [ 571.317322] ? crc32c+0x1ae/0x350 [ 571.317341] ? look_up_lock_class+0x56/0x150 [ 571.317366] ? register_lock_class+0x41/0x560 [ 571.317400] ? __lock_acquire+0xc65/0x1b70 [ 571.317429] ? lock_acquire+0x15e/0x2f0 [ 571.317448] ? ext4_map_blocks+0x49f/0x14a0 [ 571.317470] ext4_map_query_blocks+0x117/0x890 [ 571.317498] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 571.317524] ? __pfx_down_read+0x10/0x10 [ 571.317540] ? ext4_es_lookup_extent+0xc8/0xb30 [ 571.317574] ext4_map_blocks+0x4b3/0x14a0 [ 571.317596] ? __pfx_ext4_map_blocks+0x10/0x10 [ 571.317613] ? __pfx_ext4_initxattrs+0x10/0x10 [ 571.317638] ? __pfx_security_inode_init_security+0x10/0x10 [ 571.317663] ? crc32c+0x1ae/0x350 [ 571.317686] ? __brelse+0x7f/0xa0 [ 571.317710] ? __ext4_new_inode+0x116/0x4d70 [ 571.317734] ext4_append+0x1b6/0x530 [ 571.317756] ? __pfx_ext4_append+0x10/0x10 [ 571.317777] ? __pfx___ext4_new_inode+0x10/0x10 [ 571.317804] ext4_init_new_dir+0x13c/0x240 [ 571.317828] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 571.317860] ext4_mkdir+0x3c5/0xb30 [ 571.317888] ? __pfx_ext4_mkdir+0x10/0x10 [ 571.317911] ? security_inode_permission+0x72/0xe0 [ 571.317942] vfs_mkdir+0x59a/0x8d0 [ 571.317973] do_mkdirat+0x19f/0x3d0 [ 571.317994] ? __pfx_do_mkdirat+0x10/0x10 [ 571.318021] __x64_sys_mkdir+0xf3/0x140 [ 571.318041] do_syscall_64+0xbf/0x360 [ 571.318058] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 571.318077] RIP: 0033:0x7f4dc31f3c27 [ 571.318091] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.318107] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 571.318124] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 571.318136] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 571.318146] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 571.318157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 571.318167] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 571.318191] 15:50:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 14) 15:50:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:50:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 13) 15:50:51 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 19) [ 571.370469] FAULT_INJECTION: forcing a failure. [ 571.370469] name failslab, interval 1, probability 0, space 0, times 0 [ 571.371515] CPU: 0 UID: 0 PID: 5863 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 571.371538] Tainted: [W]=WARN [ 571.371542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 571.371550] Call Trace: [ 571.371554] [ 571.371559] dump_stack_lvl+0xfa/0x120 [ 571.371586] should_fail_ex+0x4d7/0x5e0 [ 571.371604] should_failslab+0xc2/0x120 [ 571.371620] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 571.371635] ? lock_acquire+0x15e/0x2f0 [ 571.371650] ? sidtab_sid2str_get+0x85/0x6f0 [ 571.371666] ? sidtab_sid2str_get+0x17e/0x6f0 [ 571.371686] ? kmemdup_noprof+0x2b/0x60 [ 571.371705] kmemdup_noprof+0x2b/0x60 [ 571.371723] sidtab_sid2str_get+0x17e/0x6f0 [ 571.371742] sidtab_entry_to_string+0x33/0x110 [ 571.371758] security_sid_to_context_core+0x350/0x620 [ 571.371776] selinux_inode_init_security+0x433/0x650 [ 571.371795] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 571.371811] ? trace_kmalloc+0x1f/0xb0 [ 571.371826] ? current_umask+0x12/0x80 [ 571.371840] ? security_inode_init_security+0x13d/0x390 [ 571.371859] security_inode_init_security+0x1e6/0x390 [ 571.371873] ? __pfx_ext4_initxattrs+0x10/0x10 [ 571.371890] ? __pfx_security_inode_init_security+0x10/0x10 [ 571.371906] ? crc32c+0x1ae/0x350 [ 571.371921] __ext4_new_inode+0x3452/0x4d70 [ 571.371944] ? __pfx___ext4_new_inode+0x10/0x10 [ 571.371960] ? __pfx___dquot_initialize+0x10/0x10 [ 571.371983] ext4_mkdir+0x331/0xb30 [ 571.372006] ? __pfx_ext4_mkdir+0x10/0x10 [ 571.372022] ? security_inode_permission+0x72/0xe0 [ 571.372043] vfs_mkdir+0x59a/0x8d0 [ 571.372063] do_mkdirat+0x19f/0x3d0 [ 571.372078] ? __pfx_do_mkdirat+0x10/0x10 [ 571.372096] __x64_sys_mkdir+0xf3/0x140 [ 571.372109] do_syscall_64+0xbf/0x360 [ 571.372122] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 571.372135] RIP: 0033:0x7f7957b21c27 [ 571.372144] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 571.372156] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 571.372168] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 571.372176] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 571.372183] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 571.372190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 571.372197] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 571.372213] 15:50:51 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 571.401550] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.401981] No source specified 15:50:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:50:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) [ 571.476815] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:51 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 17) [ 571.484549] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.513712] SELinux: security_context_str_to_sid () failed with errno=-22 [ 571.537522] No source specified [ 571.549830] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 18) 15:50:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 14) 15:50:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB]) 15:50:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 20) 15:50:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 15) 15:50:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontex']) 15:50:59 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:50:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 579.929438] FAULT_INJECTION: forcing a failure. [ 579.929438] name failslab, interval 1, probability 0, space 0, times 0 [ 579.930517] CPU: 0 UID: 0 PID: 5885 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 579.930536] Tainted: [W]=WARN [ 579.930540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 579.930547] Call Trace: [ 579.930551] [ 579.930556] dump_stack_lvl+0xfa/0x120 [ 579.930580] should_fail_ex+0x4d7/0x5e0 [ 579.930598] should_failslab+0xc2/0x120 [ 579.930614] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 579.930628] ? lock_acquire+0x15e/0x2f0 [ 579.930642] ? sidtab_sid2str_get+0x85/0x6f0 [ 579.930658] ? sidtab_sid2str_get+0x17e/0x6f0 [ 579.930681] ? kmemdup_noprof+0x2b/0x60 [ 579.930699] kmemdup_noprof+0x2b/0x60 [ 579.930717] sidtab_sid2str_get+0x17e/0x6f0 [ 579.930736] sidtab_entry_to_string+0x33/0x110 [ 579.930752] security_sid_to_context_core+0x350/0x620 [ 579.930769] selinux_inode_init_security+0x433/0x650 [ 579.930788] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 579.930803] ? trace_kmalloc+0x1f/0xb0 [ 579.930818] ? current_umask+0x12/0x80 [ 579.930832] ? security_inode_init_security+0x13d/0x390 [ 579.930851] security_inode_init_security+0x1e6/0x390 [ 579.930865] ? __pfx_ext4_initxattrs+0x10/0x10 [ 579.930882] ? __pfx_security_inode_init_security+0x10/0x10 [ 579.930898] ? crc32c+0x1ae/0x350 [ 579.930912] __ext4_new_inode+0x3452/0x4d70 [ 579.930935] ? __pfx___ext4_new_inode+0x10/0x10 [ 579.930950] ? __pfx___dquot_initialize+0x10/0x10 [ 579.930974] ext4_mkdir+0x331/0xb30 [ 579.930996] ? __pfx_ext4_mkdir+0x10/0x10 [ 579.931011] ? security_inode_permission+0x72/0xe0 [ 579.931032] vfs_mkdir+0x59a/0x8d0 [ 579.931053] do_mkdirat+0x19f/0x3d0 [ 579.931066] ? __pfx_do_mkdirat+0x10/0x10 [ 579.931084] __x64_sys_mkdir+0xf3/0x140 [ 579.931097] do_syscall_64+0xbf/0x360 [ 579.931109] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 579.931122] RIP: 0033:0x7f52aa14ac27 [ 579.931132] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.931143] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 579.931155] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 579.931162] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 579.931169] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 579.931176] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 579.931183] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 579.931200] [ 579.961009] vfat: Unknown parameter 'defcontex' [ 579.968286] SELinux: security_context_str_to_sid () failed with errno=-22 [ 579.986923] SELinux: security_context_str_to_sid () failed with errno=-22 [ 579.987523] No source specified [ 579.989622] FAULT_INJECTION: forcing a failure. [ 579.989622] name failslab, interval 1, probability 0, space 0, times 0 [ 579.991430] CPU: 1 UID: 0 PID: 5894 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 579.991465] Tainted: [W]=WARN [ 579.991473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 579.991485] Call Trace: [ 579.991492] [ 579.991501] dump_stack_lvl+0xfa/0x120 [ 579.991543] should_fail_ex+0x4d7/0x5e0 [ 579.991573] ? __es_insert_extent+0xed2/0x1370 [ 579.991606] should_failslab+0xc2/0x120 [ 579.991633] kmem_cache_alloc_noprof+0x72/0x690 [ 579.991667] ? __es_insert_extent+0xed2/0x1370 [ 579.991704] __es_insert_extent+0xed2/0x1370 [ 579.991738] ? __pfx_do_raw_write_lock+0x10/0x10 [ 579.991780] ext4_es_insert_extent+0x4d0/0x1100 [ 579.991824] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 579.991864] ? lock_acquire+0x15e/0x2f0 [ 579.991891] ? find_held_lock+0x2b/0x80 [ 579.991923] ? ext4_es_find_extent_range+0x1cf/0x510 [ 579.991957] ? lock_release+0xc8/0x290 [ 579.991984] ? do_raw_read_unlock+0x44/0xe0 [ 579.992021] ext4_ext_map_blocks+0x178d/0x5f70 [ 579.992059] ? lock_acquire+0x15e/0x2f0 [ 579.992082] ? fs_reclaim_acquire+0xae/0x150 [ 579.992109] ? lock_is_held_type+0x9e/0x120 [ 579.992150] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 579.992178] ? bdev_getblk+0x84/0xf0 [ 579.992204] ? crc32c+0x1ae/0x350 [ 579.992227] ? look_up_lock_class+0x56/0x150 [ 579.992259] ? register_lock_class+0x41/0x560 [ 579.992289] ? __lock_acquire+0xc65/0x1b70 15:50:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysa']) 15:50:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontex']) [ 579.992326] ? lock_acquire+0x15e/0x2f0 [ 579.992350] ? ext4_map_blocks+0x49f/0x14a0 [ 579.992376] ext4_map_query_blocks+0x117/0x890 [ 579.992412] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 579.992445] ? __pfx_down_read+0x10/0x10 [ 579.992465] ? ext4_es_lookup_extent+0xc8/0xb30 [ 579.992506] ext4_map_blocks+0x4b3/0x14a0 [ 579.992535] ? __pfx_ext4_map_blocks+0x10/0x10 [ 579.992555] ? __pfx_ext4_initxattrs+0x10/0x10 [ 579.992586] ? __pfx_security_inode_init_security+0x10/0x10 [ 579.992618] ? crc32c+0x1ae/0x350 [ 579.992639] ? __brelse+0x7f/0xa0 [ 579.992670] ? __ext4_new_inode+0x116/0x4d70 [ 579.992700] ext4_append+0x1b6/0x530 [ 579.992728] ? __pfx_ext4_append+0x10/0x10 [ 579.992755] ? __pfx___ext4_new_inode+0x10/0x10 [ 579.992790] ext4_init_new_dir+0x13c/0x240 [ 579.992820] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 579.992861] ext4_mkdir+0x3c5/0xb30 [ 579.992898] ? __pfx_ext4_mkdir+0x10/0x10 [ 579.992928] ? security_inode_permission+0x72/0xe0 [ 579.992968] vfs_mkdir+0x59a/0x8d0 [ 579.993006] do_mkdirat+0x19f/0x3d0 [ 579.993032] ? __pfx_do_mkdirat+0x10/0x10 [ 579.993067] __x64_sys_mkdir+0xf3/0x140 [ 579.993093] do_syscall_64+0xbf/0x360 [ 579.993116] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 579.993140] RIP: 0033:0x7f4dc31f3c27 [ 579.993158] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 579.993180] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 579.993203] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 579.993218] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 579.993233] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 579.993247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 579.993260] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 579.993293] [ 580.042085] FAULT_INJECTION: forcing a failure. [ 580.042085] name failslab, interval 1, probability 0, space 0, times 0 [ 580.044231] CPU: 1 UID: 0 PID: 5895 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 580.044265] Tainted: [W]=WARN [ 580.044272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 580.044283] Call Trace: [ 580.044290] [ 580.044298] dump_stack_lvl+0xfa/0x120 [ 580.044332] should_fail_ex+0x4d7/0x5e0 [ 580.044360] should_failslab+0xc2/0x120 [ 580.044385] __kmalloc_noprof+0xc8/0x6e0 [ 580.044418] ? ext4_find_extent+0x7f5/0xa00 [ 580.044452] ? ext4_find_extent+0x7f5/0xa00 [ 580.044478] ext4_find_extent+0x7f5/0xa00 [ 580.044512] ext4_ext_map_blocks+0x1cc/0x5f70 15:50:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mix']) [ 580.044555] ? finish_task_switch.isra.0+0x206/0x840 [ 580.044594] ? trace_sched_exit_tp+0xbf/0x100 [ 580.044630] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 580.044666] ? look_up_lock_class+0x56/0x150 [ 580.044708] ? lock_acquire+0x15e/0x2f0 [ 580.044731] ? ext4_map_blocks+0x55b/0x14a0 [ 580.044763] ? down_write+0x119/0x1f0 [ 580.044782] ? __pfx_down_write+0x10/0x10 [ 580.044800] ? ext4_es_lookup_extent+0xc8/0xb30 [ 580.044841] ext4_map_blocks+0x624/0x14a0 [ 580.044867] ? __up_read+0x197/0x750 [ 580.044894] ? __pfx_ext4_map_blocks+0x10/0x10 [ 580.044914] ? __pfx___up_read+0x10/0x10 [ 580.044943] ? lock_release+0xc8/0x290 [ 580.044973] ? ext4_map_blocks+0x1e0/0x14a0 [ 580.045001] ext4_getblk+0x682/0x8e0 [ 580.045024] ? __pfx_ext4_getblk+0x10/0x10 [ 580.045043] ? __pfx_security_inode_init_security+0x10/0x10 [ 580.045073] ? crc32c+0x1ae/0x350 [ 580.045099] ext4_bread+0x2e/0x1a0 [ 580.045122] ext4_append+0x224/0x530 [ 580.045149] ? __pfx_ext4_append+0x10/0x10 [ 580.045175] ? __pfx___ext4_new_inode+0x10/0x10 [ 580.045211] ext4_init_new_dir+0x13c/0x240 [ 580.045240] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 580.045280] ext4_mkdir+0x3c5/0xb30 [ 580.045315] ? __pfx_ext4_mkdir+0x10/0x10 [ 580.045344] ? security_inode_permission+0x72/0xe0 [ 580.045382] vfs_mkdir+0x59a/0x8d0 [ 580.045419] do_mkdirat+0x19f/0x3d0 [ 580.045444] ? __pfx_do_mkdirat+0x10/0x10 [ 580.045489] __x64_sys_mkdir+0xf3/0x140 [ 580.045514] do_syscall_64+0xbf/0x360 [ 580.045535] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 580.045556] RIP: 0033:0x7fadd609ac27 [ 580.045572] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:50:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 15) [ 580.045593] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 580.045613] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 580.045627] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 580.045641] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 580.045654] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 580.045667] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 580.045697] [ 580.084144] SELinux: security_context_str_to_sid (sysa) failed with errno=-22 [ 580.088953] vfat: Unknown parameter 'defcontex' [ 580.093785] vfat: Bad value for 'defcontext' [ 580.116445] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:59 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 580.144060] SELinux: security_context_str_to_sid () failed with errno=-22 15:50:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:50:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontex']) [ 580.168046] vfat: Bad value for 'shortname' 15:50:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 16) 15:50:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 19) 15:50:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 16) [ 580.218035] vfat: Unknown parameter 'defcontex' [ 580.220932] vfat: Bad value for 'defcontext' [ 580.226559] vfat: Unknown parameter 'defcont' [ 580.269216] SELinux: security_context_str_to_sid () failed with errno=-22 [ 580.280341] FAULT_INJECTION: forcing a failure. [ 580.280341] name failslab, interval 1, probability 0, space 0, times 0 [ 580.281385] CPU: 0 UID: 0 PID: 5916 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 580.281404] Tainted: [W]=WARN [ 580.281408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 580.281415] Call Trace: [ 580.281419] [ 580.281423] dump_stack_lvl+0xfa/0x120 [ 580.281448] should_fail_ex+0x4d7/0x5e0 [ 580.281474] should_failslab+0xc2/0x120 [ 580.281489] __kmalloc_noprof+0xc8/0x6e0 [ 580.281506] ? perf_trace_run_bpf_submit+0xef/0x180 [ 580.281523] ? perf_swevent_event+0x63/0x3f0 [ 580.281538] ? ext4_find_extent+0x7f5/0xa00 [ 580.281557] ? ext4_find_extent+0x7f5/0xa00 [ 580.281571] ext4_find_extent+0x7f5/0xa00 [ 580.281589] ext4_ext_map_blocks+0x1cc/0x5f70 [ 580.281610] ? lock_acquire+0x15e/0x2f0 [ 580.281624] ? fs_reclaim_acquire+0xae/0x150 [ 580.281639] ? lock_is_held_type+0x9e/0x120 [ 580.281662] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 580.281681] ? bdev_getblk+0x84/0xf0 [ 580.281695] ? look_up_lock_class+0x56/0x150 [ 580.281716] ? register_lock_class+0x41/0x560 [ 580.281731] ? register_lock_class+0x41/0x560 [ 580.281747] ? __lock_acquire+0xc65/0x1b70 [ 580.281766] ? lock_acquire+0x15e/0x2f0 [ 580.281779] ? ext4_map_blocks+0x49f/0x14a0 [ 580.281793] ext4_map_query_blocks+0x117/0x890 [ 580.281812] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 580.281830] ? __pfx_down_read+0x10/0x10 [ 580.281841] ? ext4_es_lookup_extent+0xc8/0xb30 [ 580.281863] ext4_map_blocks+0x4b3/0x14a0 [ 580.281878] ? __pfx_ext4_map_blocks+0x10/0x10 [ 580.281889] ? __pfx_ext4_initxattrs+0x10/0x10 [ 580.281906] ? __pfx_security_inode_init_security+0x10/0x10 [ 580.281923] ? crc32c+0x1ae/0x350 [ 580.281935] ? __brelse+0x7f/0xa0 [ 580.281952] ? __ext4_new_inode+0x116/0x4d70 [ 580.281968] ext4_append+0x1b6/0x530 [ 580.281982] ? __pfx_ext4_append+0x10/0x10 [ 580.281997] ? __pfx___ext4_new_inode+0x10/0x10 [ 580.282015] ext4_init_new_dir+0x13c/0x240 [ 580.282031] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 580.282052] ext4_mkdir+0x3c5/0xb30 [ 580.282071] ? __pfx_ext4_mkdir+0x10/0x10 [ 580.282087] ? security_inode_permission+0x72/0xe0 [ 580.282107] vfs_mkdir+0x59a/0x8d0 [ 580.282128] do_mkdirat+0x19f/0x3d0 [ 580.282142] ? __pfx_do_mkdirat+0x10/0x10 [ 580.282160] __x64_sys_mkdir+0xf3/0x140 [ 580.282174] do_syscall_64+0xbf/0x360 [ 580.282185] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 580.282198] RIP: 0033:0x7f7957b21c27 [ 580.282207] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 580.282218] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 580.282230] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 580.282237] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 580.282244] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 580.282251] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 580.282258] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 580.282275] [ 580.338904] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:10 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 20) 15:51:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 17) 15:51:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mix']) 15:51:10 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:51:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:51:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 21) 15:51:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 17) 15:51:10 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) [ 590.431343] SELinux: security_context_str_to_sid () failed with errno=-22 [ 590.438805] vfat: Bad value for 'defcontext' [ 590.441326] SELinux: security_context_str_to_sid () failed with errno=-22 [ 590.449923] SELinux: security_context_str_to_sid () failed with errno=-22 [ 590.451983] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 590.463309] vfat: Bad value for 'shortname' 15:51:10 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 22) [ 590.491339] FAULT_INJECTION: forcing a failure. [ 590.491339] name failslab, interval 1, probability 0, space 0, times 0 [ 590.493002] CPU: 1 UID: 0 PID: 5940 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 590.493037] Tainted: [W]=WARN [ 590.493044] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 590.493057] Call Trace: [ 590.493065] [ 590.493073] dump_stack_lvl+0xfa/0x120 [ 590.493114] should_fail_ex+0x4d7/0x5e0 [ 590.493144] should_failslab+0xc2/0x120 [ 590.493172] __kmalloc_noprof+0xc8/0x6e0 [ 590.493205] ? ext4_find_extent+0x7f5/0xa00 [ 590.493240] ? ext4_find_extent+0x7f5/0xa00 15:51:10 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 590.493266] ext4_find_extent+0x7f5/0xa00 [ 590.493300] ext4_ext_map_blocks+0x1cc/0x5f70 [ 590.493341] ? lock_acquire+0x15e/0x2f0 [ 590.493367] ? fs_reclaim_acquire+0xae/0x150 [ 590.493393] ? lock_is_held_type+0x9e/0x120 [ 590.493430] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 590.493467] ? crc32c+0x1ae/0x350 [ 590.493492] ? lock_acquire+0x15e/0x2f0 [ 590.493515] ? ext4_map_blocks+0x55b/0x14a0 [ 590.493547] ? down_write+0x119/0x1f0 15:51:10 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 18) [ 590.493581] ? __pfx_down_write+0x10/0x10 [ 590.493598] ? ext4_es_lookup_extent+0xc8/0xb30 [ 590.493639] ext4_map_blocks+0x624/0x14a0 [ 590.493665] ? __up_read+0x197/0x750 [ 590.493699] ? __pfx_ext4_map_blocks+0x10/0x10 [ 590.493719] ? __pfx___up_read+0x10/0x10 [ 590.493748] ? lock_release+0xc8/0x290 [ 590.493778] ? ext4_map_blocks+0x1e0/0x14a0 [ 590.493806] ext4_getblk+0x682/0x8e0 [ 590.493829] ? __pfx_ext4_getblk+0x10/0x10 [ 590.493848] ? __pfx_security_inode_init_security+0x10/0x10 [ 590.493879] ? crc32c+0x1ae/0x350 [ 590.493905] ext4_bread+0x2e/0x1a0 [ 590.493927] ext4_append+0x224/0x530 [ 590.493955] ? __pfx_ext4_append+0x10/0x10 [ 590.493981] ? __pfx___ext4_new_inode+0x10/0x10 [ 590.494020] ext4_init_new_dir+0x13c/0x240 [ 590.494050] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 590.494090] ext4_mkdir+0x3c5/0xb30 [ 590.494125] ? __pfx_ext4_mkdir+0x10/0x10 [ 590.494153] ? security_inode_permission+0x72/0xe0 [ 590.494192] vfs_mkdir+0x59a/0x8d0 [ 590.494229] do_mkdirat+0x19f/0x3d0 [ 590.494255] ? __pfx_do_mkdirat+0x10/0x10 [ 590.494289] __x64_sys_mkdir+0xf3/0x140 [ 590.494314] do_syscall_64+0xbf/0x360 [ 590.494335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 590.494358] RIP: 0033:0x7f4dc31f3c27 [ 590.494374] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.494395] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 590.494416] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 590.494430] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 590.494443] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 590.494456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 590.494469] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 590.494499] 15:51:10 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 18) [ 590.568145] vfat: Bad value for 'defcontext' 15:51:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mix']) 15:51:10 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=sysadm']) [ 590.613510] FAULT_INJECTION: forcing a failure. [ 590.613510] name failslab, interval 1, probability 0, space 0, times 0 [ 590.617227] CPU: 0 UID: 0 PID: 5943 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 590.617263] Tainted: [W]=WARN [ 590.617270] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 590.617283] Call Trace: [ 590.617290] [ 590.617298] dump_stack_lvl+0xfa/0x120 [ 590.617338] should_fail_ex+0x4d7/0x5e0 [ 590.617368] ? __es_insert_extent+0xed2/0x1370 [ 590.617399] should_failslab+0xc2/0x120 [ 590.617426] kmem_cache_alloc_noprof+0x72/0x690 [ 590.617458] ? __es_insert_extent+0xed2/0x1370 [ 590.617489] __es_insert_extent+0xed2/0x1370 [ 590.617523] ? __pfx_do_raw_write_lock+0x10/0x10 [ 590.617582] ext4_es_insert_extent+0x4d0/0x1100 [ 590.617626] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 590.617667] ? lock_acquire+0x15e/0x2f0 [ 590.617699] ? find_held_lock+0x2b/0x80 [ 590.617731] ? ext4_es_find_extent_range+0x1cf/0x510 [ 590.617765] ? lock_release+0xc8/0x290 [ 590.617791] ? do_raw_read_unlock+0x44/0xe0 [ 590.617827] ext4_ext_map_blocks+0x178d/0x5f70 [ 590.617865] ? lock_acquire+0x15e/0x2f0 [ 590.617889] ? fs_reclaim_acquire+0xae/0x150 [ 590.617915] ? lock_is_held_type+0x9e/0x120 [ 590.617956] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 590.617984] ? bdev_getblk+0x84/0xf0 [ 590.618010] ? crc32c+0x1ae/0x350 [ 590.618033] ? look_up_lock_class+0x56/0x150 [ 590.618064] ? register_lock_class+0x41/0x560 [ 590.618093] ? __lock_acquire+0xc65/0x1b70 [ 590.618130] ? lock_acquire+0x15e/0x2f0 [ 590.618154] ? ext4_map_blocks+0x49f/0x14a0 [ 590.618180] ext4_map_query_blocks+0x117/0x890 [ 590.618215] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 590.618248] ? __pfx_down_read+0x10/0x10 [ 590.618268] ? ext4_es_lookup_extent+0xc8/0xb30 [ 590.618309] ext4_map_blocks+0x4b3/0x14a0 [ 590.618337] ? __pfx_ext4_map_blocks+0x10/0x10 [ 590.618358] ? __pfx_ext4_initxattrs+0x10/0x10 [ 590.618388] ? __pfx_security_inode_init_security+0x10/0x10 [ 590.618419] ? crc32c+0x1ae/0x350 [ 590.618440] ? __brelse+0x7f/0xa0 [ 590.618471] ? __ext4_new_inode+0x116/0x4d70 [ 590.618500] ext4_append+0x1b6/0x530 [ 590.618527] ? __pfx_ext4_append+0x10/0x10 [ 590.618554] ? __pfx___ext4_new_inode+0x10/0x10 [ 590.618587] ext4_init_new_dir+0x13c/0x240 [ 590.618616] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 590.618660] ext4_mkdir+0x3c5/0xb30 [ 590.618696] ? __pfx_ext4_mkdir+0x10/0x10 [ 590.618724] ? security_inode_permission+0x72/0xe0 [ 590.618762] vfs_mkdir+0x59a/0x8d0 [ 590.618799] do_mkdirat+0x19f/0x3d0 [ 590.618825] ? __pfx_do_mkdirat+0x10/0x10 [ 590.618858] __x64_sys_mkdir+0xf3/0x140 [ 590.618884] do_syscall_64+0xbf/0x360 [ 590.618907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 590.618929] RIP: 0033:0x7f52aa14ac27 [ 590.618945] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.618965] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 590.618987] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 590.619001] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 590.619015] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 590.619028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 590.619041] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 590.619071] [ 590.683585] vfat: Bad value for 'shortname' [ 590.694935] SELinux: security_context_str_to_sid () failed with errno=-22 [ 590.701664] vfat: Bad value for 'defcontext' [ 590.704408] FAULT_INJECTION: forcing a failure. [ 590.704408] name failslab, interval 1, probability 0, space 0, times 0 [ 590.706376] CPU: 0 UID: 0 PID: 5951 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 590.706411] Tainted: [W]=WARN [ 590.706419] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 590.706431] Call Trace: [ 590.706438] [ 590.706446] dump_stack_lvl+0xfa/0x120 [ 590.706482] should_fail_ex+0x4d7/0x5e0 [ 590.706512] ? __es_insert_extent+0xed2/0x1370 [ 590.706543] should_failslab+0xc2/0x120 [ 590.706569] kmem_cache_alloc_noprof+0x72/0x690 [ 590.706601] ? __es_insert_extent+0xed2/0x1370 [ 590.706631] __es_insert_extent+0xed2/0x1370 [ 590.706666] ? __pfx_do_raw_write_lock+0x10/0x10 [ 590.706715] ext4_es_insert_extent+0x4d0/0x1100 [ 590.706759] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 590.706810] ? lock_acquire+0x15e/0x2f0 [ 590.706837] ? find_held_lock+0x2b/0x80 [ 590.706870] ? ext4_es_find_extent_range+0x1cf/0x510 [ 590.706905] ? lock_release+0xc8/0x290 [ 590.706932] ? do_raw_read_unlock+0x44/0xe0 [ 590.706970] ext4_ext_map_blocks+0x178d/0x5f70 [ 590.707010] ? lock_acquire+0x15e/0x2f0 [ 590.707033] ? fs_reclaim_acquire+0xae/0x150 [ 590.707059] ? lock_is_held_type+0x9e/0x120 [ 590.707100] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 590.707129] ? bdev_getblk+0x84/0xf0 [ 590.707154] ? crc32c+0x1ae/0x350 [ 590.707176] ? look_up_lock_class+0x56/0x150 [ 590.707208] ? register_lock_class+0x41/0x560 [ 590.707238] ? __lock_acquire+0xc65/0x1b70 [ 590.707275] ? lock_acquire+0x15e/0x2f0 [ 590.707299] ? ext4_map_blocks+0x49f/0x14a0 [ 590.707325] ext4_map_query_blocks+0x117/0x890 [ 590.707360] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 590.707401] ? __pfx_down_read+0x10/0x10 [ 590.707427] ? ext4_es_lookup_extent+0xc8/0xb30 [ 590.707469] ext4_map_blocks+0x4b3/0x14a0 [ 590.707497] ? __pfx_ext4_map_blocks+0x10/0x10 [ 590.707518] ? __pfx_ext4_initxattrs+0x10/0x10 [ 590.707548] ? __pfx_security_inode_init_security+0x10/0x10 [ 590.707579] ? crc32c+0x1ae/0x350 [ 590.707600] ? __brelse+0x7f/0xa0 [ 590.707631] ? __ext4_new_inode+0x116/0x4d70 [ 590.707660] ext4_append+0x1b6/0x530 [ 590.707688] ? __pfx_ext4_append+0x10/0x10 [ 590.707715] ? __pfx___ext4_new_inode+0x10/0x10 [ 590.707748] ext4_init_new_dir+0x13c/0x240 [ 590.707777] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 590.707817] ext4_mkdir+0x3c5/0xb30 [ 590.707853] ? __pfx_ext4_mkdir+0x10/0x10 [ 590.707882] ? security_inode_permission+0x72/0xe0 [ 590.707920] vfs_mkdir+0x59a/0x8d0 [ 590.707957] do_mkdirat+0x19f/0x3d0 [ 590.707983] ? __pfx_do_mkdirat+0x10/0x10 [ 590.708016] __x64_sys_mkdir+0xf3/0x140 [ 590.708041] do_syscall_64+0xbf/0x360 [ 590.708063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 590.708085] RIP: 0033:0x7f7957b21c27 [ 590.708101] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 590.708122] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 590.708143] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 590.708157] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 590.708170] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 590.708183] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 590.708196] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 590.708227] [ 590.724844] SELinux: security_context_str_to_sid (sysadm) failed with errno=-22 [ 590.732759] SELinux: security_context_str_to_sid () failed with errno=-22 [ 590.783032] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:10 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defc']) [ 590.881230] vfat: Unknown parameter 'defc' 15:51:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defc']) 15:51:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 19) 15:51:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 23) 15:51:20 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 1) 15:51:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:51:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 21) 15:51:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 1) 15:51:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 19) [ 600.906145] SELinux: security_context_str_to_sid () failed with errno=-22 [ 600.925977] vfat: Bad value for 'defcontext' [ 600.927662] FAULT_INJECTION: forcing a failure. [ 600.927662] name failslab, interval 1, probability 0, space 0, times 0 [ 600.928798] CPU: 0 UID: 0 PID: 5967 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 600.928821] Tainted: [W]=WARN [ 600.928825] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 600.928833] Call Trace: [ 600.928838] [ 600.928844] dump_stack_lvl+0xfa/0x120 [ 600.928873] should_fail_ex+0x4d7/0x5e0 [ 600.928893] ? getname_flags.part.0+0x48/0x540 [ 600.928913] should_failslab+0xc2/0x120 [ 600.928931] kmem_cache_alloc_noprof+0x72/0x690 [ 600.928948] ? fput+0x6a/0x100 [ 600.928968] ? getname_flags.part.0+0x48/0x540 [ 600.928987] getname_flags.part.0+0x48/0x540 [ 600.929008] __x64_sys_mkdir+0xdb/0x140 [ 600.929024] do_syscall_64+0xbf/0x360 [ 600.929039] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 600.929054] RIP: 0033:0x7f6d0c15cc27 [ 600.929065] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 600.929078] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 600.929092] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 600.929101] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 600.929110] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 600.929118] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 600.929126] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 600.929145] [ 600.936268] vfat: Unknown parameter 'defc' [ 600.955046] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 2) [ 601.007244] SELinux: security_context_str_to_sid () failed with errno=-22 [ 601.010565] SELinux: security_context_str_to_sid () failed with errno=-22 [ 601.014500] FAULT_INJECTION: forcing a failure. [ 601.014500] name failslab, interval 1, probability 0, space 0, times 0 [ 601.016343] CPU: 1 UID: 0 PID: 5975 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 601.016379] Tainted: [W]=WARN [ 601.016387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.016400] Call Trace: [ 601.016407] [ 601.016416] dump_stack_lvl+0xfa/0x120 [ 601.016457] should_fail_ex+0x4d7/0x5e0 [ 601.016487] ? getname_flags.part.0+0x48/0x540 [ 601.016519] should_failslab+0xc2/0x120 [ 601.016547] kmem_cache_alloc_noprof+0x72/0x690 [ 601.016573] ? fput+0x6a/0x100 [ 601.016606] ? getname_flags.part.0+0x48/0x540 [ 601.016637] getname_flags.part.0+0x48/0x540 [ 601.016679] __x64_sys_mkdir+0xdb/0x140 [ 601.016706] do_syscall_64+0xbf/0x360 [ 601.016729] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.016753] RIP: 0033:0x7f6d651fcc27 [ 601.016770] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.016792] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.016814] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 601.016829] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.016843] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 601.016857] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 601.016871] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 601.016901] 15:51:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 20) 15:51:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defc']) [ 601.054007] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 601.070180] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 22) 15:51:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 1) [ 601.101507] vfat: Unknown parameter 'defc' 15:51:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 3) 15:51:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 24) 15:51:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 20) [ 601.174447] FAULT_INJECTION: forcing a failure. [ 601.174447] name failslab, interval 1, probability 0, space 0, times 0 [ 601.176066] FAULT_INJECTION: forcing a failure. [ 601.176066] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 601.176274] CPU: 1 UID: 0 PID: 5986 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 601.176311] Tainted: [W]=WARN [ 601.176319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.176332] Call Trace: [ 601.176340] [ 601.176349] dump_stack_lvl+0xfa/0x120 [ 601.176391] should_fail_ex+0x4d7/0x5e0 [ 601.176422] ? getname_flags.part.0+0x48/0x540 [ 601.176454] should_failslab+0xc2/0x120 [ 601.176483] kmem_cache_alloc_noprof+0x72/0x690 [ 601.176510] ? fput+0x6a/0x100 [ 601.176543] ? getname_flags.part.0+0x48/0x540 [ 601.176574] getname_flags.part.0+0x48/0x540 [ 601.176610] __x64_sys_mkdir+0xdb/0x140 [ 601.176637] do_syscall_64+0xbf/0x360 [ 601.176660] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.176691] RIP: 0033:0x7f59eeb5ac27 [ 601.176709] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.176731] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.176754] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 601.176769] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.176783] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 601.176797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 601.176811] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 601.176842] [ 601.188139] CPU: 0 UID: 0 PID: 5989 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 601.188157] Tainted: [W]=WARN [ 601.188161] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.188167] Call Trace: [ 601.188171] [ 601.188175] dump_stack_lvl+0xfa/0x120 [ 601.188193] should_fail_ex+0x4d7/0x5e0 [ 601.188209] strncpy_from_user+0x3b/0x2f0 [ 601.188229] getname_flags.part.0+0x8d/0x540 [ 601.188247] __x64_sys_mkdir+0xdb/0x140 [ 601.188260] do_syscall_64+0xbf/0x360 [ 601.188271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.188282] RIP: 0033:0x7f6d0c15cc27 [ 601.188291] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.188302] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.188313] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 601.188320] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.188327] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 601.188334] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 601.188341] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 601.188356] [ 601.200278] FAULT_INJECTION: forcing a failure. [ 601.200278] name failslab, interval 1, probability 0, space 0, times 0 [ 601.201184] CPU: 0 UID: 0 PID: 5990 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 601.201202] Tainted: [W]=WARN [ 601.201206] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.201212] Call Trace: [ 601.201216] [ 601.201220] dump_stack_lvl+0xfa/0x120 [ 601.201239] should_fail_ex+0x4d7/0x5e0 [ 601.201253] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 601.201266] should_failslab+0xc2/0x120 [ 601.201280] kmem_cache_alloc_noprof+0x72/0x690 [ 601.201292] ? do_raw_spin_unlock+0x53/0x220 [ 601.201313] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 601.201324] ext4_mb_new_blocks+0x64e/0x45b0 [ 601.201340] ? kasan_save_track+0x14/0x30 [ 601.201356] ? __kasan_kmalloc+0x7f/0x90 [ 601.201370] ? trace_kmalloc+0x1f/0xb0 [ 601.201383] ? __kmalloc_noprof+0x29d/0x6e0 [ 601.201400] ? ext4_find_extent+0x7f5/0xa00 [ 601.201415] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 601.201428] ? ext4_ext_search_right+0x2e8/0xbd0 [ 601.201443] ? ext4_inode_to_goal_block+0x323/0x430 [ 601.201459] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 601.201481] ? lock_acquire+0x15e/0x2f0 [ 601.201494] ? fs_reclaim_acquire+0xae/0x150 [ 601.201508] ? lock_is_held_type+0x9e/0x120 [ 601.201529] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 601.201548] ? look_up_lock_class+0x56/0x150 [ 601.201566] ? lock_acquire+0x15e/0x2f0 [ 601.201579] ? ext4_map_blocks+0x55b/0x14a0 [ 601.201598] ? __pfx_down_write+0x10/0x10 [ 601.201608] ? ext4_es_lookup_extent+0xc8/0xb30 [ 601.201630] ext4_map_blocks+0x624/0x14a0 [ 601.201644] ? __up_read+0x197/0x750 [ 601.201674] ? __pfx_ext4_map_blocks+0x10/0x10 [ 601.201685] ? __pfx___up_read+0x10/0x10 [ 601.201701] ? lock_release+0xc8/0x290 [ 601.201717] ? ext4_map_blocks+0x1e0/0x14a0 [ 601.201732] ext4_getblk+0x682/0x8e0 [ 601.201744] ? __pfx_ext4_getblk+0x10/0x10 [ 601.201755] ? __pfx_security_inode_init_security+0x10/0x10 [ 601.201772] ? crc32c+0x1ae/0x350 [ 601.201788] ext4_bread+0x2e/0x1a0 [ 601.201800] ext4_append+0x224/0x530 [ 601.201815] ? __pfx_ext4_append+0x10/0x10 [ 601.201829] ? __pfx___ext4_new_inode+0x10/0x10 [ 601.201847] ext4_init_new_dir+0x13c/0x240 [ 601.201863] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 601.201884] ext4_mkdir+0x3c5/0xb30 [ 601.201903] ? __pfx_ext4_mkdir+0x10/0x10 [ 601.201919] ? security_inode_permission+0x72/0xe0 [ 601.201940] vfs_mkdir+0x59a/0x8d0 [ 601.201959] do_mkdirat+0x19f/0x3d0 [ 601.201973] ? __pfx_do_mkdirat+0x10/0x10 [ 601.201990] __x64_sys_mkdir+0xf3/0x140 [ 601.202004] do_syscall_64+0xbf/0x360 [ 601.202015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.202027] RIP: 0033:0x7f4dc31f3c27 [ 601.202035] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.202046] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.202057] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 601.202064] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.202071] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 601.202078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 601.202085] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 601.202102] [ 601.211386] FAULT_INJECTION: forcing a failure. [ 601.211386] name failslab, interval 1, probability 0, space 0, times 0 [ 601.243868] CPU: 1 UID: 0 PID: 5993 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 601.243905] Tainted: [W]=WARN [ 601.243912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.243925] Call Trace: [ 601.243934] [ 601.243943] dump_stack_lvl+0xfa/0x120 [ 601.243984] should_fail_ex+0x4d7/0x5e0 [ 601.244014] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 601.244038] should_failslab+0xc2/0x120 [ 601.244066] kmem_cache_alloc_noprof+0x72/0x690 [ 601.244100] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 601.244122] ext4_mb_new_blocks+0x2414/0x45b0 [ 601.244155] ? kasan_save_track+0x14/0x30 [ 601.244183] ? __kasan_kmalloc+0x7f/0x90 [ 601.244211] ? trace_kmalloc+0x1f/0xb0 [ 601.244237] ? __kmalloc_noprof+0x29d/0x6e0 [ 601.244272] ? ext4_find_extent+0x7f5/0xa00 [ 601.244302] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 601.244328] ? ext4_ext_search_right+0x2e8/0xbd0 [ 601.244357] ? ext4_inode_to_goal_block+0x323/0x430 [ 601.244389] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 601.244432] ? lock_acquire+0x15e/0x2f0 [ 601.244459] ? fs_reclaim_acquire+0xae/0x150 [ 601.244487] ? lock_is_held_type+0x9e/0x120 [ 601.244526] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 601.244566] ? look_up_lock_class+0x56/0x150 [ 601.244602] ? lock_acquire+0x15e/0x2f0 [ 601.244627] ? ext4_map_blocks+0x55b/0x14a0 [ 601.244664] ? __pfx_down_write+0x10/0x10 [ 601.244690] ? ext4_es_lookup_extent+0xc8/0xb30 [ 601.244734] ext4_map_blocks+0x624/0x14a0 [ 601.244762] ? __up_read+0x197/0x750 [ 601.244791] ? __pfx_ext4_map_blocks+0x10/0x10 [ 601.244813] ? __pfx___up_read+0x10/0x10 [ 601.244844] ? lock_release+0xc8/0x290 [ 601.244876] ? ext4_map_blocks+0x1e0/0x14a0 [ 601.244906] ext4_getblk+0x682/0x8e0 [ 601.244930] ? __pfx_ext4_getblk+0x10/0x10 [ 601.244951] ? __pfx_security_inode_init_security+0x10/0x10 [ 601.244983] ? crc32c+0x1ae/0x350 [ 601.245012] ext4_bread+0x2e/0x1a0 [ 601.245036] ext4_append+0x224/0x530 [ 601.245065] ? __pfx_ext4_append+0x10/0x10 [ 601.245094] ? __pfx___ext4_new_inode+0x10/0x10 [ 601.245129] ext4_init_new_dir+0x13c/0x240 [ 601.245161] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 601.245203] ext4_mkdir+0x3c5/0xb30 [ 601.245241] ? __pfx_ext4_mkdir+0x10/0x10 [ 601.245272] ? security_inode_permission+0x72/0xe0 [ 601.245313] vfs_mkdir+0x59a/0x8d0 [ 601.245353] do_mkdirat+0x19f/0x3d0 [ 601.245380] ? __pfx_do_mkdirat+0x10/0x10 [ 601.245416] __x64_sys_mkdir+0xf3/0x140 [ 601.245442] do_syscall_64+0xbf/0x360 [ 601.245465] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.245488] RIP: 0033:0x7fadd609ac27 [ 601.245506] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.245528] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.245550] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 601.245565] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.245579] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 601.245593] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 601.245607] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 601.245640] [ 601.299071] FAULT_INJECTION: forcing a failure. [ 601.299071] name failslab, interval 1, probability 0, space 0, times 0 [ 601.300945] CPU: 1 UID: 0 PID: 5994 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 601.300981] Tainted: [W]=WARN [ 601.300988] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 601.301001] Call Trace: [ 601.301008] [ 601.301017] dump_stack_lvl+0xfa/0x120 [ 601.301053] should_fail_ex+0x4d7/0x5e0 [ 601.301084] should_failslab+0xc2/0x120 [ 601.301111] __kmalloc_noprof+0xc8/0x6e0 [ 601.301146] ? ext4_find_extent+0x7f5/0xa00 [ 601.301181] ? ext4_find_extent+0x7f5/0xa00 [ 601.301209] ext4_find_extent+0x7f5/0xa00 [ 601.301246] ext4_ext_map_blocks+0x1cc/0x5f70 [ 601.301289] ? lock_acquire+0x15e/0x2f0 [ 601.301315] ? fs_reclaim_acquire+0xae/0x150 [ 601.301342] ? lock_is_held_type+0x9e/0x120 [ 601.301381] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 601.301420] ? look_up_lock_class+0x56/0x150 [ 601.301456] ? lock_acquire+0x15e/0x2f0 [ 601.301481] ? ext4_map_blocks+0x55b/0x14a0 [ 601.301515] ? down_write+0x119/0x1f0 [ 601.301535] ? __pfx_down_write+0x10/0x10 [ 601.301554] ? ext4_es_lookup_extent+0xc8/0xb30 [ 601.301598] ext4_map_blocks+0x624/0x14a0 [ 601.301626] ? __up_read+0x197/0x750 [ 601.301670] ? __pfx_ext4_map_blocks+0x10/0x10 [ 601.301698] ? __pfx___up_read+0x10/0x10 [ 601.301729] ? lock_release+0xc8/0x290 [ 601.301762] ? ext4_map_blocks+0x1e0/0x14a0 [ 601.301791] ext4_getblk+0x682/0x8e0 [ 601.301816] ? __pfx_ext4_getblk+0x10/0x10 [ 601.301836] ? __pfx_security_inode_init_security+0x10/0x10 [ 601.301869] ? crc32c+0x1ae/0x350 [ 601.301897] ext4_bread+0x2e/0x1a0 [ 601.301921] ext4_append+0x224/0x530 [ 601.301950] ? __pfx_ext4_append+0x10/0x10 [ 601.301979] ? __pfx___ext4_new_inode+0x10/0x10 [ 601.302014] ext4_init_new_dir+0x13c/0x240 [ 601.302046] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 601.302088] ext4_mkdir+0x3c5/0xb30 [ 601.302126] ? __pfx_ext4_mkdir+0x10/0x10 [ 601.302157] ? security_inode_permission+0x72/0xe0 [ 601.302198] vfs_mkdir+0x59a/0x8d0 [ 601.302237] do_mkdirat+0x19f/0x3d0 [ 601.302265] ? __pfx_do_mkdirat+0x10/0x10 [ 601.302300] __x64_sys_mkdir+0xf3/0x140 [ 601.302327] do_syscall_64+0xbf/0x360 [ 601.302350] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 601.302372] RIP: 0033:0x7f52aa14ac27 [ 601.302390] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 601.302411] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 601.302434] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 601.302449] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 601.302463] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 601.302476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 601.302490] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 601.302523] 15:51:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 21) 15:51:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 2) 15:51:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 25) 15:51:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 23) 15:51:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 4) 15:51:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 2) 15:51:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 21) 15:51:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 610.223599] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.227427] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.230108] FAULT_INJECTION: forcing a failure. [ 610.230108] name failslab, interval 1, probability 0, space 0, times 0 [ 610.231715] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.231990] CPU: 1 UID: 0 PID: 6013 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 610.232027] Tainted: [W]=WARN [ 610.232034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 610.232047] Call Trace: [ 610.232055] [ 610.232063] dump_stack_lvl+0xfa/0x120 [ 610.232106] should_fail_ex+0x4d7/0x5e0 [ 610.232137] ? __d_alloc+0x31/0xa10 [ 610.232161] should_failslab+0xc2/0x120 [ 610.232188] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 610.232212] ? __d_lookup+0x255/0x490 [ 610.232250] ? __d_alloc+0x31/0xa10 [ 610.232273] __d_alloc+0x31/0xa10 [ 610.232301] d_alloc+0x4a/0x1e0 [ 610.232327] lookup_one_qstr_excl+0x174/0x270 [ 610.232358] ? mnt_want_write+0x153/0x420 [ 610.232392] filename_create+0x1ca/0x480 [ 610.232413] ? __pfx_filename_create+0x10/0x10 [ 610.232432] ? __virt_addr_valid+0x2e8/0x5d0 [ 610.232480] do_mkdirat+0x9a/0x3d0 [ 610.232505] ? __pfx_do_mkdirat+0x10/0x10 [ 610.232538] __x64_sys_mkdir+0xf3/0x140 [ 610.232564] do_syscall_64+0xbf/0x360 [ 610.232586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.232609] RIP: 0033:0x7f6d0c15cc27 [ 610.232626] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.232647] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.232668] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 610.232692] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.232706] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 610.232719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 610.232733] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 610.232762] [ 610.233374] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.243244] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.246383] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.268062] vfat: Unknown parameter 'defcont' 15:51:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 3) 15:51:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 26) 15:51:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 24) [ 610.329360] FAULT_INJECTION: forcing a failure. [ 610.329360] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 610.330475] CPU: 0 UID: 0 PID: 6018 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 610.330495] Tainted: [W]=WARN [ 610.330499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 610.330506] Call Trace: [ 610.330511] [ 610.330515] dump_stack_lvl+0xfa/0x120 [ 610.330540] should_fail_ex+0x4d7/0x5e0 [ 610.330558] strncpy_from_user+0x3b/0x2f0 [ 610.330578] getname_flags.part.0+0x8d/0x540 [ 610.330598] __x64_sys_mkdir+0xdb/0x140 [ 610.330612] do_syscall_64+0xbf/0x360 [ 610.330624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.330638] RIP: 0033:0x7f59eeb5ac27 [ 610.330647] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.330658] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.330675] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 610.330683] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.330690] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 610.330697] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 610.330704] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 610.330723] [ 610.353647] FAULT_INJECTION: forcing a failure. [ 610.353647] name failslab, interval 1, probability 0, space 0, times 0 [ 610.355562] CPU: 0 UID: 0 PID: 6019 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 610.355581] Tainted: [W]=WARN [ 610.355584] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 610.355591] Call Trace: [ 610.355595] [ 610.355599] dump_stack_lvl+0xfa/0x120 [ 610.355618] should_fail_ex+0x4d7/0x5e0 [ 610.355631] ? __es_remove_extent+0x53f/0x1570 [ 610.355652] ? __es_insert_extent+0xed2/0x1370 [ 610.355674] should_failslab+0xc2/0x120 [ 610.355689] kmem_cache_alloc_noprof+0x72/0x690 [ 610.355703] ? __pfx___es_remove_extent+0x10/0x10 [ 610.355728] ? __es_insert_extent+0xed2/0x1370 [ 610.355745] __es_insert_extent+0xed2/0x1370 [ 610.355770] ext4_es_insert_extent+0x4d0/0x1100 [ 610.355791] ? crc32c+0x1ae/0x350 [ 610.355804] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 610.355822] ? lock_acquire+0x15e/0x2f0 [ 610.355836] ? ext4_map_blocks+0x55b/0x14a0 [ 610.355855] ? __pfx_down_write+0x10/0x10 [ 610.355866] ? ext4_es_lookup_extent+0xc8/0xb30 [ 610.355888] ext4_map_blocks+0x7ff/0x14a0 [ 610.355902] ? __up_read+0x197/0x750 [ 610.355917] ? __pfx_ext4_map_blocks+0x10/0x10 [ 610.355928] ? __pfx___up_read+0x10/0x10 [ 610.355943] ? lock_release+0xc8/0x290 [ 610.355960] ? ext4_map_blocks+0x1e0/0x14a0 [ 610.355975] ext4_getblk+0x682/0x8e0 [ 610.355987] ? __pfx_ext4_getblk+0x10/0x10 [ 610.355997] ? __pfx_security_inode_init_security+0x10/0x10 [ 610.356015] ? crc32c+0x1ae/0x350 [ 610.356029] ext4_bread+0x2e/0x1a0 [ 610.356041] ext4_append+0x224/0x530 [ 610.356056] ? __pfx_ext4_append+0x10/0x10 [ 610.356071] ? __pfx___ext4_new_inode+0x10/0x10 [ 610.356089] ext4_init_new_dir+0x13c/0x240 [ 610.356105] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 610.356127] ext4_mkdir+0x3c5/0xb30 [ 610.356146] ? __pfx_ext4_mkdir+0x10/0x10 [ 610.356161] ? security_inode_permission+0x72/0xe0 [ 610.356182] vfs_mkdir+0x59a/0x8d0 [ 610.356202] do_mkdirat+0x19f/0x3d0 [ 610.356216] ? __pfx_do_mkdirat+0x10/0x10 [ 610.356234] __x64_sys_mkdir+0xf3/0x140 [ 610.356247] do_syscall_64+0xbf/0x360 [ 610.356259] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.356270] RIP: 0033:0x7fadd609ac27 [ 610.356279] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.356290] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.356301] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609ac27 [ 610.356309] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.356316] RBP: 00007fadd3611040 R08: 0000000000000000 R09: 0000000001000001 [ 610.356323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 610.356330] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 610.356346] [ 610.381611] FAULT_INJECTION: forcing a failure. [ 610.381611] name failslab, interval 1, probability 0, space 0, times 0 15:51:30 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 5) 15:51:30 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 22) 15:51:30 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 3) [ 610.382530] CPU: 0 UID: 0 PID: 6021 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 610.382549] Tainted: [W]=WARN [ 610.382552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 610.382558] Call Trace: [ 610.382562] [ 610.382566] dump_stack_lvl+0xfa/0x120 [ 610.382585] should_fail_ex+0x4d7/0x5e0 [ 610.382600] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 610.382611] should_failslab+0xc2/0x120 [ 610.382624] kmem_cache_alloc_noprof+0x72/0x690 [ 610.382642] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 610.382653] ext4_mb_new_blocks+0x2414/0x45b0 [ 610.382673] ? kasan_save_track+0x14/0x30 [ 610.382688] ? __kasan_kmalloc+0x7f/0x90 [ 610.382702] ? trace_kmalloc+0x1f/0xb0 [ 610.382715] ? __kmalloc_noprof+0x29d/0x6e0 [ 610.382733] ? ext4_find_extent+0x7f5/0xa00 [ 610.382748] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 610.382761] ? ext4_ext_search_right+0x2e8/0xbd0 [ 610.382775] ? ext4_inode_to_goal_block+0x323/0x430 [ 610.382791] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 610.382813] ? lock_acquire+0x15e/0x2f0 [ 610.382826] ? fs_reclaim_acquire+0xae/0x150 [ 610.382841] ? lock_is_held_type+0x9e/0x120 [ 610.382861] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 610.382881] ? crc32c+0x1ae/0x350 [ 610.382894] ? lock_acquire+0x15e/0x2f0 [ 610.382906] ? ext4_map_blocks+0x55b/0x14a0 [ 610.382925] ? __pfx_down_write+0x10/0x10 [ 610.382934] ? ext4_es_lookup_extent+0xc8/0xb30 [ 610.382957] ext4_map_blocks+0x624/0x14a0 [ 610.382970] ? __up_read+0x197/0x750 [ 610.382985] ? __pfx_ext4_map_blocks+0x10/0x10 [ 610.382996] ? __pfx___up_read+0x10/0x10 [ 610.383012] ? lock_release+0xc8/0x290 [ 610.383028] ? ext4_map_blocks+0x1e0/0x14a0 [ 610.383043] ext4_getblk+0x682/0x8e0 [ 610.383055] ? __pfx_ext4_getblk+0x10/0x10 [ 610.383065] ? __pfx_security_inode_init_security+0x10/0x10 [ 610.383081] ? crc32c+0x1ae/0x350 [ 610.383095] ext4_bread+0x2e/0x1a0 [ 610.383107] ext4_append+0x224/0x530 [ 610.383121] ? __pfx_ext4_append+0x10/0x10 [ 610.383136] ? __pfx___ext4_new_inode+0x10/0x10 [ 610.383154] ext4_init_new_dir+0x13c/0x240 [ 610.383169] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 610.383191] ext4_mkdir+0x3c5/0xb30 [ 610.383210] ? __pfx_ext4_mkdir+0x10/0x10 [ 610.383225] ? security_inode_permission+0x72/0xe0 [ 610.383245] vfs_mkdir+0x59a/0x8d0 [ 610.383265] do_mkdirat+0x19f/0x3d0 [ 610.383278] ? __pfx_do_mkdirat+0x10/0x10 [ 610.383296] __x64_sys_mkdir+0xf3/0x140 [ 610.383310] do_syscall_64+0xbf/0x360 [ 610.383321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.383332] RIP: 0033:0x7f4dc31f3c27 [ 610.383341] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.383352] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.383363] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 610.383371] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.383378] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 610.383385] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 610.383392] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 610.383408] 15:51:30 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 22) [ 610.448990] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 4) [ 610.467277] FAULT_INJECTION: forcing a failure. [ 610.467277] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 610.468232] CPU: 0 UID: 0 PID: 6026 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 610.468250] Tainted: [W]=WARN [ 610.468254] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 610.468261] Call Trace: [ 610.468266] [ 610.468270] dump_stack_lvl+0xfa/0x120 [ 610.468293] should_fail_ex+0x4d7/0x5e0 [ 610.468310] strncpy_from_user+0x3b/0x2f0 [ 610.468331] getname_flags.part.0+0x8d/0x540 [ 610.468350] __x64_sys_mkdir+0xdb/0x140 [ 610.468363] do_syscall_64+0xbf/0x360 [ 610.468375] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.468387] RIP: 0033:0x7f59eeb5ac27 [ 610.468397] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.468408] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.468420] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 610.468427] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.468434] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 610.468441] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 610.468448] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 610.468463] [ 610.479346] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:30 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) [ 610.507887] FAULT_INJECTION: forcing a failure. [ 610.507887] name failslab, interval 1, probability 0, space 0, times 0 [ 610.509621] CPU: 1 UID: 0 PID: 6029 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 610.509656] Tainted: [W]=WARN [ 610.509664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 610.509682] Call Trace: [ 610.509690] [ 610.509699] dump_stack_lvl+0xfa/0x120 [ 610.509753] should_fail_ex+0x4d7/0x5e0 [ 610.509785] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 610.509809] should_failslab+0xc2/0x120 [ 610.509837] kmem_cache_alloc_noprof+0x72/0x690 [ 610.509860] ? do_raw_spin_unlock+0x53/0x220 [ 610.509899] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 610.509920] ext4_mb_new_blocks+0x64e/0x45b0 [ 610.509951] ? kasan_save_track+0x14/0x30 [ 610.509978] ? __kasan_kmalloc+0x7f/0x90 [ 610.510004] ? trace_kmalloc+0x1f/0xb0 [ 610.510029] ? __kmalloc_noprof+0x29d/0x6e0 [ 610.510062] ? ext4_find_extent+0x7f5/0xa00 [ 610.510091] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 610.510115] ? ext4_ext_search_right+0x2e8/0xbd0 [ 610.510143] ? ext4_inode_to_goal_block+0x323/0x430 [ 610.510174] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 610.510217] ? finish_task_switch.isra.0+0x206/0x840 [ 610.510256] ? trace_sched_exit_tp+0xbf/0x100 [ 610.510293] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 610.510329] ? crc32c+0x1ae/0x350 [ 610.510356] ? lock_acquire+0x15e/0x2f0 [ 610.510382] ? ext4_map_blocks+0x55b/0x14a0 [ 610.510417] ? __pfx_down_write+0x10/0x10 [ 610.510437] ? ext4_es_lookup_extent+0xc8/0xb30 [ 610.510479] ext4_map_blocks+0x624/0x14a0 [ 610.510505] ? __up_read+0x197/0x750 [ 610.510532] ? __pfx_ext4_map_blocks+0x10/0x10 [ 610.510553] ? __pfx___up_read+0x10/0x10 [ 610.510582] ? lock_release+0xc8/0x290 [ 610.510613] ? ext4_map_blocks+0x1e0/0x14a0 [ 610.510641] ext4_getblk+0x682/0x8e0 [ 610.510664] ? __pfx_ext4_getblk+0x10/0x10 [ 610.510683] ? __pfx_security_inode_init_security+0x10/0x10 [ 610.510715] ? crc32c+0x1ae/0x350 [ 610.510741] ext4_bread+0x2e/0x1a0 [ 610.510764] ext4_append+0x224/0x530 [ 610.510791] ? __pfx_ext4_append+0x10/0x10 [ 610.510818] ? __pfx___ext4_new_inode+0x10/0x10 [ 610.510851] ext4_init_new_dir+0x13c/0x240 [ 610.510882] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 610.510922] ext4_mkdir+0x3c5/0xb30 [ 610.510957] ? __pfx_ext4_mkdir+0x10/0x10 [ 610.510986] ? security_inode_permission+0x72/0xe0 [ 610.511025] vfs_mkdir+0x59a/0x8d0 [ 610.511064] do_mkdirat+0x19f/0x3d0 [ 610.511091] ? __pfx_do_mkdirat+0x10/0x10 [ 610.511124] __x64_sys_mkdir+0xf3/0x140 [ 610.511151] do_syscall_64+0xbf/0x360 [ 610.511176] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 610.511198] RIP: 0033:0x7f52aa14ac27 [ 610.511215] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 610.511236] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 610.511258] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 610.511272] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 610.511286] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 610.511299] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 610.511312] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 610.511343] [ 610.556500] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 610.567173] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:30 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 5) 15:51:30 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 25) [ 610.605174] vfat: Unknown parameter 'defcont' [ 610.610941] SELinux: security_context_str_to_sid () failed with errno=-22 [ 610.614243] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 27) 15:51:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 23) 15:51:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 6) 15:51:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 6) 15:51:40 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 4) 15:51:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 23) 15:51:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcont']) 15:51:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 26) [ 620.453910] SELinux: security_context_str_to_sid () failed with errno=-22 [ 620.455458] SELinux: security_context_str_to_sid () failed with errno=-22 [ 620.460836] FAULT_INJECTION: forcing a failure. [ 620.460836] name failslab, interval 1, probability 0, space 0, times 0 [ 620.462524] CPU: 1 UID: 0 PID: 6056 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 620.462559] Tainted: [W]=WARN [ 620.462566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 620.462578] Call Trace: [ 620.462585] [ 620.462593] dump_stack_lvl+0xfa/0x120 [ 620.462632] should_fail_ex+0x4d7/0x5e0 [ 620.462656] ? __es_remove_extent+0x53f/0x1570 [ 620.462699] ? __es_insert_extent+0xed2/0x1370 [ 620.462729] should_failslab+0xc2/0x120 [ 620.462755] kmem_cache_alloc_noprof+0x72/0x690 [ 620.462779] ? __pfx___es_remove_extent+0x10/0x10 [ 620.462816] ? __es_insert_extent+0xed2/0x1370 [ 620.462846] __es_insert_extent+0xed2/0x1370 [ 620.462891] ext4_es_insert_extent+0x4d0/0x1100 [ 620.462929] ? crc32c+0x1ae/0x350 [ 620.462951] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 620.462984] ? lock_acquire+0x15e/0x2f0 [ 620.463009] ? ext4_map_blocks+0x55b/0x14a0 [ 620.463042] ? __pfx_down_write+0x10/0x10 [ 620.463061] ? ext4_es_lookup_extent+0xc8/0xb30 [ 620.463101] ext4_map_blocks+0x7ff/0x14a0 [ 620.463126] ? __up_read+0x197/0x750 [ 620.463153] ? __pfx_ext4_map_blocks+0x10/0x10 [ 620.463172] ? __pfx___up_read+0x10/0x10 [ 620.463201] ? lock_release+0xc8/0x290 [ 620.463230] ? ext4_map_blocks+0x1e0/0x14a0 [ 620.463257] ext4_getblk+0x682/0x8e0 [ 620.463279] ? __pfx_ext4_getblk+0x10/0x10 [ 620.463297] ? __pfx_security_inode_init_security+0x10/0x10 [ 620.463328] ? crc32c+0x1ae/0x350 [ 620.463354] ext4_bread+0x2e/0x1a0 [ 620.463375] ext4_append+0x224/0x530 [ 620.463402] ? __pfx_ext4_append+0x10/0x10 [ 620.463428] ? __pfx___ext4_new_inode+0x10/0x10 [ 620.463460] ext4_init_new_dir+0x13c/0x240 [ 620.463489] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 620.463528] ext4_mkdir+0x3c5/0xb30 [ 620.463562] ? __pfx_ext4_mkdir+0x10/0x10 [ 620.463590] ? security_inode_permission+0x72/0xe0 [ 620.463627] vfs_mkdir+0x59a/0x8d0 [ 620.463664] do_mkdirat+0x19f/0x3d0 [ 620.463689] ? __pfx_do_mkdirat+0x10/0x10 [ 620.463721] __x64_sys_mkdir+0xf3/0x140 [ 620.463746] do_syscall_64+0xbf/0x360 [ 620.463767] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.463788] RIP: 0033:0x7f4dc31f3c27 [ 620.463805] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 620.463825] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 620.463845] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 620.463859] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 620.463871] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 620.463884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 620.463896] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 620.463926] [ 620.468525] FAULT_INJECTION: forcing a failure. [ 620.468525] name failslab, interval 1, probability 0, space 0, times 0 [ 620.490490] SELinux: security_context_str_to_sid () failed with errno=-22 [ 620.490890] CPU: 0 UID: 0 PID: 6048 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 620.490926] Tainted: [W]=WARN [ 620.490934] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 620.490947] Call Trace: [ 620.490955] [ 620.490964] dump_stack_lvl+0xfa/0x120 [ 620.491006] should_fail_ex+0x4d7/0x5e0 [ 620.491036] ? ext4_alloc_inode+0x28/0x600 [ 620.491064] should_failslab+0xc2/0x120 [ 620.491091] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 620.491122] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 620.491152] ? ext4_alloc_inode+0x28/0x600 [ 620.491177] ext4_alloc_inode+0x28/0x600 [ 620.491204] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 620.491230] alloc_inode+0x67/0x250 [ 620.491259] new_inode+0x1e/0x160 [ 620.491289] __ext4_new_inode+0x35d/0x4d70 [ 620.491323] ? avc_has_perm_noaudit+0x150/0x3d0 [ 620.491363] ? __pfx___ext4_new_inode+0x10/0x10 [ 620.491389] ? __pfx_avc_has_perm+0x10/0x10 [ 620.491422] ? __pfx___dquot_initialize+0x10/0x10 [ 620.491464] ext4_mkdir+0x331/0xb30 [ 620.491504] ? __pfx_ext4_mkdir+0x10/0x10 [ 620.491533] ? security_inode_permission+0x72/0xe0 [ 620.491572] vfs_mkdir+0x59a/0x8d0 [ 620.491609] do_mkdirat+0x19f/0x3d0 [ 620.491635] ? __pfx_do_mkdirat+0x10/0x10 [ 620.491667] __x64_sys_mkdir+0xf3/0x140 [ 620.491700] do_syscall_64+0xbf/0x360 [ 620.491722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.491745] RIP: 0033:0x7f6d651fcc27 [ 620.491762] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 620.491783] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 620.491804] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 620.491818] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 620.491831] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 620.491844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 620.491857] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 620.491887] [ 620.495215] FAULT_INJECTION: forcing a failure. [ 620.495215] name failslab, interval 1, probability 0, space 0, times 0 [ 620.500233] SELinux: security_context_str_to_sid () failed with errno=-22 [ 620.500944] CPU: 0 UID: 0 PID: 6057 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 620.500979] Tainted: [W]=WARN [ 620.500986] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 620.500998] Call Trace: [ 620.501005] [ 620.501014] dump_stack_lvl+0xfa/0x120 [ 620.501048] should_fail_ex+0x4d7/0x5e0 [ 620.501075] ? ext4_alloc_inode+0x28/0x600 [ 620.501101] should_failslab+0xc2/0x120 [ 620.501125] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 620.501155] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 620.501184] ? ext4_alloc_inode+0x28/0x600 [ 620.501210] ext4_alloc_inode+0x28/0x600 [ 620.501237] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 620.501263] alloc_inode+0x67/0x250 [ 620.501291] new_inode+0x1e/0x160 [ 620.501320] __ext4_new_inode+0x35d/0x4d70 [ 620.501352] ? avc_has_perm_noaudit+0x150/0x3d0 [ 620.501391] ? __pfx___ext4_new_inode+0x10/0x10 [ 620.501417] ? __pfx_avc_has_perm+0x10/0x10 [ 620.501450] ? __pfx___dquot_initialize+0x10/0x10 [ 620.501491] ext4_mkdir+0x331/0xb30 [ 620.501530] ? __pfx_ext4_mkdir+0x10/0x10 [ 620.501558] ? security_inode_permission+0x72/0xe0 [ 620.501596] vfs_mkdir+0x59a/0x8d0 [ 620.501632] do_mkdirat+0x19f/0x3d0 [ 620.501657] ? __pfx_do_mkdirat+0x10/0x10 [ 620.501698] __x64_sys_mkdir+0xf3/0x140 [ 620.501723] do_syscall_64+0xbf/0x360 [ 620.501744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.501765] RIP: 0033:0x7f59eeb5ac27 [ 620.501781] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 620.501801] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 620.501821] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 620.501835] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 620.501865] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 620.501878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 620.501891] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 620.501920] [ 620.503563] FAULT_INJECTION: forcing a failure. [ 620.503563] name failslab, interval 1, probability 0, space 0, times 0 [ 620.508063] vfat: Unknown parameter 'defcont' [ 620.508497] CPU: 0 UID: 0 PID: 6059 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 620.508531] Tainted: [W]=WARN [ 620.508538] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 620.508550] Call Trace: [ 620.508557] [ 620.508565] dump_stack_lvl+0xfa/0x120 [ 620.508599] should_fail_ex+0x4d7/0x5e0 [ 620.508626] ? ext4_alloc_inode+0x28/0x600 [ 620.508652] should_failslab+0xc2/0x120 [ 620.508684] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 620.508714] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 620.508743] ? ext4_alloc_inode+0x28/0x600 [ 620.508768] ext4_alloc_inode+0x28/0x600 [ 620.508795] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 620.508821] alloc_inode+0x67/0x250 [ 620.508849] new_inode+0x1e/0x160 [ 620.508878] __ext4_new_inode+0x35d/0x4d70 [ 620.508910] ? avc_has_perm_noaudit+0x150/0x3d0 [ 620.508948] ? __pfx___ext4_new_inode+0x10/0x10 [ 620.508975] ? __pfx_avc_has_perm+0x10/0x10 [ 620.509008] ? __pfx___dquot_initialize+0x10/0x10 [ 620.509049] ext4_mkdir+0x331/0xb30 [ 620.509087] ? __pfx_ext4_mkdir+0x10/0x10 [ 620.509116] ? security_inode_permission+0x72/0xe0 [ 620.509153] vfs_mkdir+0x59a/0x8d0 [ 620.509189] do_mkdirat+0x19f/0x3d0 [ 620.509214] ? __pfx_do_mkdirat+0x10/0x10 [ 620.509247] __x64_sys_mkdir+0xf3/0x140 [ 620.509272] do_syscall_64+0xbf/0x360 [ 620.509293] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.509314] RIP: 0033:0x7f6d0c15cc27 [ 620.509330] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 620.509350] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 620.509371] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 620.509385] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 620.509398] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 620.509410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 620.509423] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 620.509453] 15:51:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 7) 15:51:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 7) 15:51:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 24) 15:51:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 28) 15:51:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 24) 15:51:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 27) [ 620.719545] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 620.726306] FAULT_INJECTION: forcing a failure. [ 620.726306] name failslab, interval 1, probability 0, space 0, times 0 [ 620.727369] CPU: 1 UID: 0 PID: 6066 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 620.727390] Tainted: [W]=WARN [ 620.727394] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 620.727402] Call Trace: [ 620.727407] [ 620.727412] dump_stack_lvl+0xfa/0x120 [ 620.727440] should_fail_ex+0x4d7/0x5e0 [ 620.727459] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 620.727473] should_failslab+0xc2/0x120 [ 620.727490] kmem_cache_alloc_noprof+0x72/0x690 [ 620.727510] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 620.727522] ext4_mb_new_blocks+0x2414/0x45b0 [ 620.727539] ? kasan_save_track+0x14/0x30 [ 620.727555] ? __kasan_kmalloc+0x7f/0x90 [ 620.727570] ? trace_kmalloc+0x1f/0xb0 [ 620.727585] ? __kmalloc_noprof+0x29d/0x6e0 [ 620.727603] ? ext4_find_extent+0x7f5/0xa00 [ 620.727620] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 620.727634] ? ext4_ext_search_right+0x2e8/0xbd0 [ 620.727650] ? ext4_inode_to_goal_block+0x323/0x430 [ 620.727668] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 620.727697] ? lock_acquire+0x15e/0x2f0 [ 620.727712] ? fs_reclaim_acquire+0xae/0x150 [ 620.727727] ? lock_is_held_type+0x9e/0x120 [ 620.727750] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 620.727770] ? crc32c+0x1ae/0x350 [ 620.727785] ? lock_acquire+0x15e/0x2f0 [ 620.727799] ? ext4_map_blocks+0x55b/0x14a0 [ 620.727819] ? __pfx_down_write+0x10/0x10 [ 620.727831] ? ext4_es_lookup_extent+0xc8/0xb30 [ 620.727854] ext4_map_blocks+0x624/0x14a0 [ 620.727871] ? __up_read+0x197/0x750 [ 620.727894] ? __pfx_ext4_map_blocks+0x10/0x10 [ 620.727912] ? __pfx___up_read+0x10/0x10 [ 620.727938] ? lock_release+0xc8/0x290 [ 620.727959] ? ext4_map_blocks+0x1e0/0x14a0 [ 620.727975] ext4_getblk+0x682/0x8e0 [ 620.727989] ? __pfx_ext4_getblk+0x10/0x10 [ 620.727999] ? __pfx_security_inode_init_security+0x10/0x10 [ 620.728018] ? crc32c+0x1ae/0x350 [ 620.728034] ext4_bread+0x2e/0x1a0 [ 620.728046] ext4_append+0x224/0x530 [ 620.728062] ? __pfx_ext4_append+0x10/0x10 [ 620.728077] ? __pfx___ext4_new_inode+0x10/0x10 [ 620.728097] ext4_init_new_dir+0x13c/0x240 [ 620.728114] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 620.728137] ext4_mkdir+0x3c5/0xb30 [ 620.728157] ? __pfx_ext4_mkdir+0x10/0x10 [ 620.728174] ? security_inode_permission+0x72/0xe0 [ 620.728196] vfs_mkdir+0x59a/0x8d0 [ 620.728219] do_mkdirat+0x19f/0x3d0 [ 620.728234] ? __pfx_do_mkdirat+0x10/0x10 [ 620.728252] __x64_sys_mkdir+0xf3/0x140 [ 620.728267] do_syscall_64+0xbf/0x360 [ 620.728280] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.728294] RIP: 0033:0x7f7957b21c27 [ 620.728304] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 620.728316] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 620.728328] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 620.728336] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 620.728345] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 620.728352] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 620.728359] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 620.728377] [ 620.753882] SELinux: security_context_str_to_sid () failed with errno=-22 [ 620.763329] SELinux: security_context_str_to_sid () failed with errno=-22 [ 620.792524] FAULT_INJECTION: forcing a failure. [ 620.792524] name failslab, interval 1, probability 0, space 0, times 0 [ 620.793622] CPU: 1 UID: 0 PID: 6071 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 620.793642] Tainted: [W]=WARN [ 620.793646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 620.793653] Call Trace: [ 620.793657] [ 620.793661] dump_stack_lvl+0xfa/0x120 [ 620.793689] should_fail_ex+0x4d7/0x5e0 [ 620.793705] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 620.793717] should_failslab+0xc2/0x120 [ 620.793731] kmem_cache_alloc_noprof+0x72/0x690 [ 620.793749] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 620.793761] ext4_mb_new_blocks+0x2414/0x45b0 [ 620.793778] ? kasan_save_track+0x14/0x30 [ 620.793793] ? __kasan_kmalloc+0x7f/0x90 [ 620.793807] ? trace_kmalloc+0x1f/0xb0 [ 620.793821] ? __kmalloc_noprof+0x29d/0x6e0 [ 620.793847] ? ext4_find_extent+0x7f5/0xa00 [ 620.793865] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 620.793884] ? ext4_ext_search_right+0x2e8/0xbd0 [ 620.793906] ? ext4_inode_to_goal_block+0x323/0x430 [ 620.793933] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 620.793971] ? lock_acquire+0x15e/0x2f0 [ 620.793993] ? fs_reclaim_acquire+0xae/0x150 [ 620.794015] ? lock_is_held_type+0x9e/0x120 [ 620.794049] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 620.794081] ? crc32c+0x1ae/0x350 [ 620.794099] ? lock_acquire+0x15e/0x2f0 [ 620.794112] ? ext4_map_blocks+0x55b/0x14a0 [ 620.794131] ? __pfx_down_write+0x10/0x10 [ 620.794141] ? ext4_es_lookup_extent+0xc8/0xb30 [ 620.794164] ext4_map_blocks+0x624/0x14a0 [ 620.794178] ? __up_read+0x197/0x750 [ 620.794193] ? __pfx_ext4_map_blocks+0x10/0x10 [ 620.794204] ? __pfx___up_read+0x10/0x10 [ 620.794221] ? lock_release+0xc8/0x290 [ 620.794238] ? ext4_map_blocks+0x1e0/0x14a0 [ 620.794253] ext4_getblk+0x682/0x8e0 [ 620.794266] ? __pfx_ext4_getblk+0x10/0x10 [ 620.794276] ? __pfx_security_inode_init_security+0x10/0x10 [ 620.794294] ? crc32c+0x1ae/0x350 [ 620.794308] ext4_bread+0x2e/0x1a0 [ 620.794321] ext4_append+0x224/0x530 [ 620.794336] ? __pfx_ext4_append+0x10/0x10 [ 620.794351] ? __pfx___ext4_new_inode+0x10/0x10 [ 620.794369] ext4_init_new_dir+0x13c/0x240 [ 620.794386] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 620.794408] ext4_mkdir+0x3c5/0xb30 [ 620.794427] ? __pfx_ext4_mkdir+0x10/0x10 [ 620.794443] ? security_inode_permission+0x72/0xe0 [ 620.794464] vfs_mkdir+0x59a/0x8d0 [ 620.794485] do_mkdirat+0x19f/0x3d0 [ 620.794500] ? __pfx_do_mkdirat+0x10/0x10 [ 620.794518] __x64_sys_mkdir+0xf3/0x140 [ 620.794532] do_syscall_64+0xbf/0x360 [ 620.794545] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 620.794558] RIP: 0033:0x7f52aa14ac27 [ 620.794567] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 620.794579] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 620.794591] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 620.794599] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 620.794606] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 620.794613] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 620.794621] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 620.794637] [ 620.863377] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontex']) 15:51:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 28) 15:51:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 25) 15:51:49 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 5) 15:51:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 8) 15:51:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 29) 15:51:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 8) 15:51:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 25) [ 630.051457] vfat: Unknown parameter 'defcontex' [ 630.058064] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.065511] FAULT_INJECTION: forcing a failure. [ 630.065511] name failslab, interval 1, probability 0, space 0, times 0 [ 630.066544] CPU: 0 UID: 0 PID: 6084 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 630.066563] Tainted: [W]=WARN [ 630.066567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.066575] Call Trace: [ 630.066580] [ 630.066584] dump_stack_lvl+0xfa/0x120 [ 630.066613] should_fail_ex+0x4d7/0x5e0 [ 630.066630] ? security_inode_alloc+0x3e/0x130 [ 630.066648] should_failslab+0xc2/0x120 [ 630.066663] kmem_cache_alloc_noprof+0x72/0x690 [ 630.066681] ? __pfx_map_id_range_down+0x10/0x10 [ 630.066701] ? security_inode_alloc+0x3e/0x130 [ 630.066716] security_inode_alloc+0x3e/0x130 [ 630.066732] inode_init_always_gfp+0xc94/0xff0 [ 630.066748] alloc_inode+0x8d/0x250 [ 630.066764] new_inode+0x1e/0x160 [ 630.066780] __ext4_new_inode+0x35d/0x4d70 [ 630.066800] ? avc_has_perm_noaudit+0x150/0x3d0 [ 630.066822] ? __pfx___ext4_new_inode+0x10/0x10 [ 630.066836] ? __pfx_avc_has_perm+0x10/0x10 [ 630.066854] ? __pfx___dquot_initialize+0x10/0x10 [ 630.066878] ext4_mkdir+0x331/0xb30 [ 630.066900] ? __pfx_ext4_mkdir+0x10/0x10 [ 630.066916] ? security_inode_permission+0x72/0xe0 [ 630.066936] vfs_mkdir+0x59a/0x8d0 [ 630.066957] do_mkdirat+0x19f/0x3d0 [ 630.066971] ? __pfx_do_mkdirat+0x10/0x10 [ 630.066989] __x64_sys_mkdir+0xf3/0x140 [ 630.067002] do_syscall_64+0xbf/0x360 [ 630.067015] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.067028] RIP: 0033:0x7f59eeb5ac27 [ 630.067038] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.067050] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 630.067062] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 630.067070] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 630.067077] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 630.067085] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 630.067092] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 630.067108] [ 630.104058] FAULT_INJECTION: forcing a failure. [ 630.104058] name failslab, interval 1, probability 0, space 0, times 0 [ 630.105013] CPU: 0 UID: 0 PID: 6090 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 630.105033] Tainted: [W]=WARN [ 630.105037] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.105044] Call Trace: [ 630.105048] [ 630.105052] dump_stack_lvl+0xfa/0x120 [ 630.105077] should_fail_ex+0x4d7/0x5e0 [ 630.105096] ? security_inode_alloc+0x3e/0x130 [ 630.105112] should_failslab+0xc2/0x120 [ 630.105126] kmem_cache_alloc_noprof+0x72/0x690 [ 630.105138] ? __pfx_map_id_range_down+0x10/0x10 [ 630.105157] ? security_inode_alloc+0x3e/0x130 [ 630.105171] security_inode_alloc+0x3e/0x130 [ 630.105187] inode_init_always_gfp+0xc94/0xff0 [ 630.105203] alloc_inode+0x8d/0x250 [ 630.105218] new_inode+0x1e/0x160 [ 630.105234] __ext4_new_inode+0x35d/0x4d70 [ 630.105253] ? avc_has_perm_noaudit+0x150/0x3d0 [ 630.105274] ? __pfx___ext4_new_inode+0x10/0x10 [ 630.105289] ? __pfx_avc_has_perm+0x10/0x10 [ 630.105306] ? __pfx___dquot_initialize+0x10/0x10 [ 630.105330] ext4_mkdir+0x331/0xb30 [ 630.105352] ? __pfx_ext4_mkdir+0x10/0x10 [ 630.105367] ? security_inode_permission+0x72/0xe0 [ 630.105387] vfs_mkdir+0x59a/0x8d0 [ 630.105407] do_mkdirat+0x19f/0x3d0 [ 630.105421] ? __pfx_do_mkdirat+0x10/0x10 [ 630.105439] __x64_sys_mkdir+0xf3/0x140 [ 630.105452] do_syscall_64+0xbf/0x360 [ 630.105464] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.105477] RIP: 0033:0x7f6d0c15cc27 [ 630.105486] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.105498] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 630.105509] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 630.105517] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 630.105524] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 15:51:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontex']) [ 630.105532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 630.105539] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 630.105555] [ 630.114459] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.131472] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.131569] FAULT_INJECTION: forcing a failure. [ 630.131569] name failslab, interval 1, probability 0, space 0, times 0 [ 630.133426] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.134093] CPU: 0 UID: 0 PID: 6094 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 630.134113] Tainted: [W]=WARN [ 630.134118] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.134126] Call Trace: [ 630.134130] [ 630.134135] dump_stack_lvl+0xfa/0x120 [ 630.134157] should_fail_ex+0x4d7/0x5e0 [ 630.134173] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 630.134190] should_failslab+0xc2/0x120 [ 630.134204] kmem_cache_alloc_noprof+0x72/0x690 [ 630.134221] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 630.134236] jbd2_journal_add_journal_head+0x367/0x5d0 [ 630.134254] jbd2_journal_get_create_access+0x44/0x560 [ 630.134273] ? lock_is_held_type+0x9e/0x120 [ 630.134293] __ext4_journal_get_create_access+0x54/0x1b0 [ 630.134311] ext4_getblk+0x3c9/0x8e0 [ 630.134324] ? __pfx_ext4_getblk+0x10/0x10 [ 630.134334] ? __pfx_security_inode_init_security+0x10/0x10 [ 630.134351] ? crc32c+0x1ae/0x350 [ 630.134367] ext4_bread+0x2e/0x1a0 [ 630.134379] ext4_append+0x224/0x530 [ 630.134394] ? __pfx_ext4_append+0x10/0x10 [ 630.134408] ? __pfx___ext4_new_inode+0x10/0x10 [ 630.134426] ext4_init_new_dir+0x13c/0x240 [ 630.134442] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 630.134463] ext4_mkdir+0x3c5/0xb30 [ 630.134482] ? __pfx_ext4_mkdir+0x10/0x10 [ 630.134498] ? security_inode_permission+0x72/0xe0 [ 630.134519] vfs_mkdir+0x59a/0x8d0 [ 630.134538] do_mkdirat+0x19f/0x3d0 [ 630.134552] ? __pfx_do_mkdirat+0x10/0x10 [ 630.134569] __x64_sys_mkdir+0xf3/0x140 [ 630.134583] do_syscall_64+0xbf/0x360 [ 630.134594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.134606] RIP: 0033:0x7f4dc31f3c27 [ 630.134616] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.134627] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 630.134639] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f3c27 [ 630.134647] RDX: 0000000000000001 RSI: 00000000000001ff RDI: 00000000200000c0 [ 630.134655] RBP: 00007f4dc076a040 R08: 0000000000000000 R09: 0000000000000000 [ 630.134662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 630.134674] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 630.134690] [ 630.152955] ENOMEM in journal_alloc_journal_head, retrying. 15:51:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 26) [ 630.182112] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.199326] FAULT_INJECTION: forcing a failure. [ 630.199326] name failslab, interval 1, probability 0, space 0, times 0 [ 630.200252] CPU: 0 UID: 0 PID: 6097 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 630.200273] Tainted: [W]=WARN [ 630.200277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.200285] Call Trace: [ 630.200290] [ 630.200294] dump_stack_lvl+0xfa/0x120 [ 630.200322] should_fail_ex+0x4d7/0x5e0 [ 630.200338] ? __es_remove_extent+0x53f/0x1570 [ 630.200359] ? __es_insert_extent+0xed2/0x1370 [ 630.200376] should_failslab+0xc2/0x120 [ 630.200392] kmem_cache_alloc_noprof+0x72/0x690 [ 630.200407] ? __pfx___es_remove_extent+0x10/0x10 [ 630.200428] ? __es_insert_extent+0xed2/0x1370 [ 630.200445] __es_insert_extent+0xed2/0x1370 [ 630.200470] ext4_es_insert_extent+0x4d0/0x1100 [ 630.200492] ? crc32c+0x1ae/0x350 [ 630.200505] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 630.200524] ? lock_acquire+0x15e/0x2f0 [ 630.200540] ? ext4_map_blocks+0x55b/0x14a0 [ 630.200559] ? __pfx_down_write+0x10/0x10 [ 630.200571] ? ext4_es_lookup_extent+0xc8/0xb30 [ 630.200593] ext4_map_blocks+0x7ff/0x14a0 [ 630.200608] ? __up_read+0x197/0x750 [ 630.200623] ? __pfx_ext4_map_blocks+0x10/0x10 [ 630.200635] ? __pfx___up_read+0x10/0x10 [ 630.200651] ? lock_release+0xc8/0x290 [ 630.200672] ? ext4_map_blocks+0x1e0/0x14a0 [ 630.200687] ext4_getblk+0x682/0x8e0 [ 630.200699] ? __pfx_ext4_getblk+0x10/0x10 [ 630.200710] ? __pfx_security_inode_init_security+0x10/0x10 [ 630.200729] ? crc32c+0x1ae/0x350 [ 630.200744] ext4_bread+0x2e/0x1a0 [ 630.200756] ext4_append+0x224/0x530 [ 630.200772] ? __pfx_ext4_append+0x10/0x10 [ 630.200786] ? __pfx___ext4_new_inode+0x10/0x10 [ 630.200805] ext4_init_new_dir+0x13c/0x240 [ 630.200822] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 630.200844] ext4_mkdir+0x3c5/0xb30 [ 630.200863] ? __pfx_ext4_mkdir+0x10/0x10 [ 630.200879] ? security_inode_permission+0x72/0xe0 [ 630.200900] vfs_mkdir+0x59a/0x8d0 [ 630.200922] do_mkdirat+0x19f/0x3d0 [ 630.200936] ? __pfx_do_mkdirat+0x10/0x10 [ 630.200955] __x64_sys_mkdir+0xf3/0x140 [ 630.200968] do_syscall_64+0xbf/0x360 [ 630.200981] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.200993] RIP: 0033:0x7f52aa14ac27 [ 630.201003] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.201015] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 630.201027] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14ac27 [ 630.201036] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 630.201043] RBP: 00007f52a76c1040 R08: 0000000000000000 R09: 0000000000000000 [ 630.201051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 630.201059] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 630.201076] 15:51:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 26) 15:51:49 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 6) 15:51:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 9) 15:51:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 9) 15:51:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 29) [ 630.262202] vfat: Unknown parameter 'defcontex' [ 630.262777] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 27) 15:51:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 30) [ 630.316953] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 630.328820] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.336581] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.338566] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.356266] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.370304] SELinux: security_context_str_to_sid () failed with errno=-22 15:51:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 10) 15:51:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 28) 15:51:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 30) [ 630.439995] SELinux: security_context_str_to_sid () failed with errno=-22 [ 630.469005] FAULT_INJECTION: forcing a failure. [ 630.469005] name failslab, interval 1, probability 0, space 0, times 0 [ 630.469947] CPU: 0 UID: 0 PID: 6119 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 630.469968] Tainted: [W]=WARN [ 630.469972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 630.469980] Call Trace: [ 630.469985] [ 630.469990] dump_stack_lvl+0xfa/0x120 [ 630.470019] should_fail_ex+0x4d7/0x5e0 [ 630.470038] ? jbd2__journal_start+0x193/0x6b0 [ 630.470057] should_failslab+0xc2/0x120 [ 630.470073] kmem_cache_alloc_noprof+0x72/0x690 [ 630.470087] ? lock_is_held_type+0x9e/0x120 [ 630.470106] ? lock_is_held_type+0x9e/0x120 [ 630.470124] ? jbd2__journal_start+0x193/0x6b0 [ 630.470141] jbd2__journal_start+0x193/0x6b0 [ 630.470160] __ext4_journal_start_sb+0x325/0x5d0 [ 630.470179] __ext4_new_inode+0x2cbe/0x4d70 [ 630.470201] ? __pfx___ext4_new_inode+0x10/0x10 [ 630.470216] ? __pfx_avc_has_perm+0x10/0x10 [ 630.470236] ? __pfx___dquot_initialize+0x10/0x10 [ 630.470259] ext4_mkdir+0x331/0xb30 [ 630.470282] ? __pfx_ext4_mkdir+0x10/0x10 [ 630.470297] ? security_inode_permission+0x72/0xe0 [ 630.470319] vfs_mkdir+0x59a/0x8d0 [ 630.470340] do_mkdirat+0x19f/0x3d0 [ 630.470355] ? __pfx_do_mkdirat+0x10/0x10 [ 630.470372] __x64_sys_mkdir+0xf3/0x140 [ 630.470386] do_syscall_64+0xbf/0x360 [ 630.470398] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 630.470411] RIP: 0033:0x7f6d0c15cc27 [ 630.470421] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 630.470433] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 630.470445] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 630.470453] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 630.470461] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 630.470469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 630.470476] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 630.470493] [ 630.470500] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory 15:52:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontex']) 15:52:00 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 11) 15:52:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 31) 15:52:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 29) 15:52:00 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 10) 15:52:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 27) 15:52:00 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 7) 15:52:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 31) [ 640.568976] vfat: Unknown parameter 'defcontex' [ 640.577612] FAULT_INJECTION: forcing a failure. [ 640.577612] name failslab, interval 1, probability 0, space 0, times 0 [ 640.578547] CPU: 0 UID: 0 PID: 6134 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.578566] Tainted: [W]=WARN [ 640.578570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.578578] Call Trace: [ 640.578582] [ 640.578587] dump_stack_lvl+0xfa/0x120 [ 640.578615] should_fail_ex+0x4d7/0x5e0 [ 640.578632] ? jbd2__journal_start+0x193/0x6b0 [ 640.578650] should_failslab+0xc2/0x120 [ 640.578665] kmem_cache_alloc_noprof+0x72/0x690 [ 640.578678] ? lock_is_held_type+0x9e/0x120 [ 640.578695] ? lock_is_held_type+0x9e/0x120 [ 640.578714] ? jbd2__journal_start+0x193/0x6b0 [ 640.578730] jbd2__journal_start+0x193/0x6b0 [ 640.578749] __ext4_journal_start_sb+0x325/0x5d0 [ 640.578767] __ext4_new_inode+0x2cbe/0x4d70 [ 640.578789] ? __pfx___ext4_new_inode+0x10/0x10 [ 640.578804] ? __pfx_avc_has_perm+0x10/0x10 [ 640.578823] ? __pfx___dquot_initialize+0x10/0x10 [ 640.578846] ext4_mkdir+0x331/0xb30 [ 640.578868] ? __pfx_ext4_mkdir+0x10/0x10 [ 640.578883] ? security_inode_permission+0x72/0xe0 [ 640.578904] vfs_mkdir+0x59a/0x8d0 [ 640.578926] do_mkdirat+0x19f/0x3d0 [ 640.578940] ? __pfx_do_mkdirat+0x10/0x10 [ 640.578958] __x64_sys_mkdir+0xf3/0x140 [ 640.578971] do_syscall_64+0xbf/0x360 [ 640.578983] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.578996] RIP: 0033:0x7f59eeb5ac27 [ 640.579005] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.579018] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 640.579029] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 640.579038] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.579045] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 640.579052] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 640.579059] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 640.579076] [ 640.595763] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 640.599976] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 640.611216] SELinux: security_context_str_to_sid () failed with errno=-22 [ 640.615249] FAULT_INJECTION: forcing a failure. [ 640.615249] name failslab, interval 1, probability 0, space 0, times 0 [ 640.615733] SELinux: security_context_str_to_sid () failed with errno=-22 [ 640.617024] CPU: 1 UID: 0 PID: 6137 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.617063] Tainted: [W]=WARN [ 640.617071] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.617085] Call Trace: [ 640.617093] [ 640.617103] dump_stack_lvl+0xfa/0x120 [ 640.617146] should_fail_ex+0x4d7/0x5e0 [ 640.617174] ? __es_remove_extent+0x53f/0x1570 [ 640.617214] ? __es_insert_extent+0xed2/0x1370 [ 640.617247] should_failslab+0xc2/0x120 [ 640.617276] kmem_cache_alloc_noprof+0x72/0x690 [ 640.617304] ? __pfx___es_remove_extent+0x10/0x10 [ 640.617345] ? __es_insert_extent+0xed2/0x1370 [ 640.617379] __es_insert_extent+0xed2/0x1370 [ 640.617428] ext4_es_insert_extent+0x4d0/0x1100 [ 640.617471] ? look_up_lock_class+0x56/0x150 [ 640.617507] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 640.617544] ? lock_acquire+0x15e/0x2f0 [ 640.617571] ? ext4_map_blocks+0x55b/0x14a0 [ 640.617609] ? __pfx_down_write+0x10/0x10 [ 640.617628] ? ext4_es_lookup_extent+0xc8/0xb30 [ 640.617681] ext4_map_blocks+0x7ff/0x14a0 [ 640.617709] ? __up_read+0x197/0x750 [ 640.617738] ? __pfx_ext4_map_blocks+0x10/0x10 [ 640.617761] ? __pfx___up_read+0x10/0x10 [ 640.617792] ? lock_release+0xc8/0x290 [ 640.617825] ? ext4_map_blocks+0x1e0/0x14a0 [ 640.617855] ext4_getblk+0x682/0x8e0 [ 640.617880] ? __pfx_ext4_getblk+0x10/0x10 [ 640.617900] ? __pfx_security_inode_init_security+0x10/0x10 [ 640.617934] ? crc32c+0x1ae/0x350 [ 640.617964] ext4_bread+0x2e/0x1a0 [ 640.617988] ext4_append+0x224/0x530 [ 640.618017] ? __pfx_ext4_append+0x10/0x10 [ 640.618060] ? __pfx___ext4_new_inode+0x10/0x10 [ 640.618096] ext4_init_new_dir+0x13c/0x240 [ 640.618128] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 640.618172] ext4_mkdir+0x3c5/0xb30 [ 640.618210] ? __pfx_ext4_mkdir+0x10/0x10 [ 640.618241] ? security_inode_permission+0x72/0xe0 [ 640.618283] vfs_mkdir+0x59a/0x8d0 [ 640.618324] do_mkdirat+0x19f/0x3d0 [ 640.618352] ? __pfx_do_mkdirat+0x10/0x10 [ 640.618388] __x64_sys_mkdir+0xf3/0x140 [ 640.618415] do_syscall_64+0xbf/0x360 [ 640.618439] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.618464] RIP: 0033:0x7f7957b21c27 [ 640.618483] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.618506] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 640.618528] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 640.618544] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.618559] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 640.618573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 640.618587] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 640.618620] [ 640.622933] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 1) 15:52:00 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 12) 15:52:00 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 32) [ 640.686664] SELinux: security_context_str_to_sid () failed with errno=-22 [ 640.701397] FAULT_INJECTION: forcing a failure. [ 640.701397] name failslab, interval 1, probability 0, space 0, times 0 [ 640.702353] CPU: 0 UID: 0 PID: 6144 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.702372] Tainted: [W]=WARN [ 640.702376] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.702384] Call Trace: [ 640.702389] [ 640.702393] dump_stack_lvl+0xfa/0x120 [ 640.702418] should_fail_ex+0x4d7/0x5e0 [ 640.702436] should_failslab+0xc2/0x120 [ 640.702452] __kmalloc_noprof+0xc8/0x6e0 [ 640.702469] ? current_umask+0x12/0x80 [ 640.702484] ? posix_acl_create.part.0+0x2a0/0x480 [ 640.702502] ? security_inode_init_security+0x13d/0x390 [ 640.702520] ? security_inode_init_security+0x13d/0x390 [ 640.702533] security_inode_init_security+0x13d/0x390 [ 640.702547] ? __pfx_ext4_initxattrs+0x10/0x10 [ 640.702565] ? __pfx_security_inode_init_security+0x10/0x10 [ 640.702581] ? crc32c+0x1ae/0x350 [ 640.702595] __ext4_new_inode+0x3452/0x4d70 [ 640.702617] ? __pfx___ext4_new_inode+0x10/0x10 [ 640.702633] ? __pfx___dquot_initialize+0x10/0x10 [ 640.702655] ext4_mkdir+0x331/0xb30 [ 640.702681] ? __pfx_ext4_mkdir+0x10/0x10 [ 640.702697] ? security_inode_permission+0x72/0xe0 [ 640.702717] vfs_mkdir+0x59a/0x8d0 [ 640.702738] do_mkdirat+0x19f/0x3d0 [ 640.702753] ? __pfx_do_mkdirat+0x10/0x10 [ 640.702770] __x64_sys_mkdir+0xf3/0x140 [ 640.702784] do_syscall_64+0xbf/0x360 [ 640.702796] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.702809] RIP: 0033:0x7f6d0c15cc27 [ 640.702819] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.702830] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 640.702842] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 640.702850] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.702857] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 640.702864] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 640.702871] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 640.702887] [ 640.727831] FAULT_INJECTION: forcing a failure. [ 640.727831] name failslab, interval 1, probability 0, space 0, times 0 [ 640.728814] CPU: 0 UID: 0 PID: 6146 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.728832] Tainted: [W]=WARN 15:52:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 28) [ 640.728836] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.728843] Call Trace: [ 640.728847] [ 640.728852] dump_stack_lvl+0xfa/0x120 [ 640.728870] should_fail_ex+0x4d7/0x5e0 [ 640.728885] ? getname_flags.part.0+0x48/0x540 [ 640.728901] should_failslab+0xc2/0x120 [ 640.728915] kmem_cache_alloc_noprof+0x72/0x690 [ 640.728928] ? fput+0x6a/0x100 [ 640.728945] ? getname_flags.part.0+0x48/0x540 [ 640.728961] getname_flags.part.0+0x48/0x540 [ 640.728979] __x64_sys_mkdir+0xdb/0x140 [ 640.728993] do_syscall_64+0xbf/0x360 [ 640.729004] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.729016] RIP: 0033:0x7f6bdd3d3c27 [ 640.729025] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.729036] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 640.729048] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 640.729056] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.729063] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 640.729071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 640.729078] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 640.729093] 15:52:00 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 8) 15:52:00 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 2) 15:52:00 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 30) [ 640.798144] FAULT_INJECTION: forcing a failure. [ 640.798144] name failslab, interval 1, probability 0, space 0, times 0 [ 640.799206] CPU: 0 UID: 0 PID: 6150 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.799226] Tainted: [W]=WARN [ 640.799230] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.799238] Call Trace: [ 640.799242] [ 640.799247] dump_stack_lvl+0xfa/0x120 [ 640.799270] should_fail_ex+0x4d7/0x5e0 [ 640.799287] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 640.799303] should_failslab+0xc2/0x120 [ 640.799318] kmem_cache_alloc_noprof+0x72/0x690 [ 640.799336] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 640.799352] jbd2_journal_add_journal_head+0x367/0x5d0 [ 640.799369] jbd2_journal_get_create_access+0x44/0x560 [ 640.799388] ? lock_is_held_type+0x9e/0x120 [ 640.799408] __ext4_journal_get_create_access+0x54/0x1b0 [ 640.799427] ext4_getblk+0x3c9/0x8e0 [ 640.799440] ? __pfx_ext4_getblk+0x10/0x10 [ 640.799451] ? __pfx_security_inode_init_security+0x10/0x10 [ 640.799469] ? crc32c+0x1ae/0x350 [ 640.799484] ext4_bread+0x2e/0x1a0 [ 640.799496] ext4_append+0x224/0x530 [ 640.799511] ? __pfx_ext4_append+0x10/0x10 [ 640.799526] ? __pfx___ext4_new_inode+0x10/0x10 [ 640.799544] ext4_init_new_dir+0x13c/0x240 [ 640.799561] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 640.799582] ext4_mkdir+0x3c5/0xb30 [ 640.799601] ? __pfx_ext4_mkdir+0x10/0x10 [ 640.799617] ? security_inode_permission+0x72/0xe0 [ 640.799637] vfs_mkdir+0x59a/0x8d0 [ 640.799658] do_mkdirat+0x19f/0x3d0 [ 640.799676] ? __pfx_do_mkdirat+0x10/0x10 [ 640.799694] __x64_sys_mkdir+0xf3/0x140 [ 640.799707] do_syscall_64+0xbf/0x360 [ 640.799719] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.799731] RIP: 0033:0x7f7957b21c27 [ 640.799741] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.799752] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 640.799764] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 640.799772] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.799779] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 640.799786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 640.799794] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 640.799810] [ 640.815175] FAULT_INJECTION: forcing a failure. [ 640.815175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 640.815501] ENOMEM in journal_alloc_journal_head, retrying. [ 640.816573] CPU: 1 UID: 0 PID: 6152 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.816610] Tainted: [W]=WARN [ 640.816618] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.816631] Call Trace: [ 640.816639] [ 640.816648] dump_stack_lvl+0xfa/0x120 [ 640.816696] should_fail_ex+0x4d7/0x5e0 [ 640.816727] _copy_from_user+0x30/0xd0 [ 640.816757] memdup_user+0x7e/0xe0 [ 640.816778] strndup_user+0x78/0xe0 [ 640.816798] __x64_sys_mount+0x136/0x300 [ 640.816825] ? __pfx___x64_sys_mount+0x10/0x10 [ 640.816859] do_syscall_64+0xbf/0x360 [ 640.816881] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.816904] RIP: 0033:0x7fadd609d04a [ 640.816921] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.816943] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 640.816965] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 640.816979] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 640.816993] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 640.817007] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 640.817021] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 640.817050] [ 640.833284] FAULT_INJECTION: forcing a failure. [ 640.833284] name failslab, interval 1, probability 0, space 0, times 0 [ 640.834203] CPU: 0 UID: 0 PID: 6148 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.834222] Tainted: [W]=WARN [ 640.834226] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.834233] Call Trace: [ 640.834237] [ 640.834242] dump_stack_lvl+0xfa/0x120 [ 640.834261] should_fail_ex+0x4d7/0x5e0 [ 640.834276] ? jbd2__journal_start+0x193/0x6b0 [ 640.834292] should_failslab+0xc2/0x120 [ 640.834306] kmem_cache_alloc_noprof+0x72/0x690 [ 640.834318] ? lock_is_held_type+0x9e/0x120 [ 640.834335] ? lock_is_held_type+0x9e/0x120 [ 640.834354] ? jbd2__journal_start+0x193/0x6b0 [ 640.834370] jbd2__journal_start+0x193/0x6b0 [ 640.834390] __ext4_journal_start_sb+0x325/0x5d0 [ 640.834407] __ext4_new_inode+0x2cbe/0x4d70 [ 640.834429] ? __pfx___ext4_new_inode+0x10/0x10 [ 640.834443] ? __pfx_avc_has_perm+0x10/0x10 [ 640.834463] ? __pfx___dquot_initialize+0x10/0x10 [ 640.834486] ext4_mkdir+0x331/0xb30 [ 640.834507] ? __pfx_ext4_mkdir+0x10/0x10 [ 640.834523] ? security_inode_permission+0x72/0xe0 [ 640.834543] vfs_mkdir+0x59a/0x8d0 [ 640.834563] do_mkdirat+0x19f/0x3d0 [ 640.834577] ? __pfx_do_mkdirat+0x10/0x10 [ 640.834595] __x64_sys_mkdir+0xf3/0x140 [ 640.834608] do_syscall_64+0xbf/0x360 [ 640.834620] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.834631] RIP: 0033:0x7f6d651fcc27 [ 640.834640] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.834652] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 640.834664] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 640.834676] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 640.834684] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 640.834691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 640.834699] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 640.834716] [ 640.849971] EXT4-fs error (device sda) in __ext4_new_inode:1086: Out of memory [ 640.869364] vfat: Bad value for 'defcontext' 15:52:00 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 32) [ 640.913032] SELinux: security_context_str_to_sid () failed with errno=-22 [ 640.969838] FAULT_INJECTION: forcing a failure. [ 640.969838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 640.971740] CPU: 1 UID: 0 PID: 6158 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 640.971776] Tainted: [W]=WARN [ 640.971783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 640.971797] Call Trace: [ 640.971804] [ 640.971813] dump_stack_lvl+0xfa/0x120 [ 640.971852] should_fail_ex+0x4d7/0x5e0 [ 640.971882] _copy_from_user+0x30/0xd0 [ 640.971910] memdup_user+0x7e/0xe0 [ 640.971931] strndup_user+0x78/0xe0 [ 640.971951] __x64_sys_mount+0x136/0x300 [ 640.971978] ? __pfx___x64_sys_mount+0x10/0x10 [ 640.972012] do_syscall_64+0xbf/0x360 [ 640.972033] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 640.972056] RIP: 0033:0x7f4dc31f604a [ 640.972073] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 640.972094] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 640.972116] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 640.972131] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 640.972144] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 640.972158] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 640.972172] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 640.972200] 15:52:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 11) 15:52:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 33) 15:52:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 29) 15:52:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 31) 15:52:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 13) 15:52:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 33) 15:52:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 3) 15:52:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 9) [ 649.864379] FAULT_INJECTION: forcing a failure. [ 649.864379] name failslab, interval 1, probability 0, space 0, times 0 [ 649.865475] CPU: 1 UID: 0 PID: 6172 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 649.865497] Tainted: [W]=WARN [ 649.865501] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.865510] Call Trace: [ 649.865515] [ 649.865520] dump_stack_lvl+0xfa/0x120 [ 649.865550] should_fail_ex+0x4d7/0x5e0 [ 649.865570] should_failslab+0xc2/0x120 [ 649.865587] __kmalloc_cache_noprof+0x73/0x690 [ 649.865608] ? __might_fault+0xe0/0x190 [ 649.865625] ? copy_mount_options+0x55/0x180 [ 649.865646] ? copy_mount_options+0x55/0x180 [ 649.865662] ? memdup_user+0x95/0xe0 [ 649.865679] copy_mount_options+0x55/0x180 [ 649.865697] __x64_sys_mount+0x1ab/0x300 [ 649.865714] ? __pfx___x64_sys_mount+0x10/0x10 [ 649.865734] do_syscall_64+0xbf/0x360 [ 649.865748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 649.865762] RIP: 0033:0x7fadd609d04a [ 649.865773] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 649.865786] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 649.865799] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 649.865808] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 649.865817] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 649.865826] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 649.865834] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 649.865851] [ 649.880001] SELinux: security_context_str_to_sid () failed with errno=-22 [ 649.882220] SELinux: security_context_str_to_sid () failed with errno=-22 [ 649.886765] SELinux: security_context_str_to_sid () failed with errno=-22 [ 649.895049] FAULT_INJECTION: forcing a failure. [ 649.895049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 649.897064] CPU: 0 UID: 0 PID: 6179 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 649.897100] Tainted: [W]=WARN [ 649.897107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.897120] Call Trace: [ 649.897128] [ 649.897136] dump_stack_lvl+0xfa/0x120 [ 649.897177] should_fail_ex+0x4d7/0x5e0 [ 649.897208] strncpy_from_user+0x3b/0x2f0 [ 649.897245] getname_flags.part.0+0x8d/0x540 [ 649.897280] __x64_sys_mkdir+0xdb/0x140 [ 649.897304] do_syscall_64+0xbf/0x360 [ 649.897326] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 649.897349] RIP: 0033:0x7f6bdd3d3c27 [ 649.897367] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 649.897391] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 649.897414] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 649.897428] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 649.897442] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 649.897455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 649.897469] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 649.897497] [ 649.921803] FAULT_INJECTION: forcing a failure. [ 649.921803] name failslab, interval 1, probability 0, space 0, times 0 [ 649.922067] FAULT_INJECTION: forcing a failure. [ 649.922067] name failslab, interval 1, probability 0, space 0, times 0 [ 649.923425] CPU: 0 UID: 0 PID: 6181 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 649.923460] Tainted: [W]=WARN [ 649.923467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.923479] Call Trace: [ 649.923486] [ 649.923494] dump_stack_lvl+0xfa/0x120 [ 649.923529] should_fail_ex+0x4d7/0x5e0 [ 649.923557] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 649.923587] should_failslab+0xc2/0x120 [ 649.923613] kmem_cache_alloc_noprof+0x72/0x690 [ 649.923646] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 649.923681] jbd2_journal_add_journal_head+0x367/0x5d0 [ 649.923714] jbd2_journal_get_create_access+0x44/0x560 [ 649.923750] ? lock_is_held_type+0x9e/0x120 [ 649.923784] __ext4_journal_get_create_access+0x54/0x1b0 [ 649.923817] ext4_getblk+0x3c9/0x8e0 [ 649.923841] ? __pfx_ext4_getblk+0x10/0x10 [ 649.923860] ? __pfx_security_inode_init_security+0x10/0x10 [ 649.923892] ? crc32c+0x1ae/0x350 [ 649.923919] ext4_bread+0x2e/0x1a0 [ 649.923941] ext4_append+0x224/0x530 [ 649.923969] ? __pfx_ext4_append+0x10/0x10 [ 649.923996] ? __pfx___ext4_new_inode+0x10/0x10 [ 649.924029] ext4_init_new_dir+0x13c/0x240 [ 649.924059] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 649.924099] ext4_mkdir+0x3c5/0xb30 [ 649.924134] ? __pfx_ext4_mkdir+0x10/0x10 [ 649.924163] ? security_inode_permission+0x72/0xe0 [ 649.924202] vfs_mkdir+0x59a/0x8d0 [ 649.924238] do_mkdirat+0x19f/0x3d0 [ 649.924263] ? __pfx_do_mkdirat+0x10/0x10 [ 649.924296] __x64_sys_mkdir+0xf3/0x140 [ 649.924322] do_syscall_64+0xbf/0x360 [ 649.924343] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 649.924364] RIP: 0033:0x7f7957b21c27 [ 649.924380] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 649.924401] RSP: 002b:00007f7955097fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 649.924422] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b21c27 [ 649.924436] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 649.924450] RBP: 00007f7955098040 R08: 0000000000000000 R09: 0000000000000000 [ 649.924463] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 649.924476] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 649.924507] [ 649.924546] ENOMEM in journal_alloc_journal_head, retrying. [ 649.930175] SELinux: security_context_str_to_sid () failed with errno=-22 [ 649.949334] CPU: 1 UID: 0 PID: 6178 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 649.949361] Tainted: [W]=WARN [ 649.949368] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 649.949377] Call Trace: [ 649.949383] [ 649.949390] dump_stack_lvl+0xfa/0x120 [ 649.949423] should_fail_ex+0x4d7/0x5e0 [ 649.949448] should_failslab+0xc2/0x120 [ 649.949470] __kmalloc_cache_noprof+0x73/0x690 [ 649.949496] ? __might_fault+0xe0/0x190 [ 649.949519] ? copy_mount_options+0x55/0x180 [ 649.949547] ? copy_mount_options+0x55/0x180 [ 649.949568] ? memdup_user+0x95/0xe0 [ 649.949583] copy_mount_options+0x55/0x180 [ 649.949608] __x64_sys_mount+0x1ab/0x300 [ 649.949629] ? __pfx___x64_sys_mount+0x10/0x10 [ 649.949656] do_syscall_64+0xbf/0x360 [ 649.949679] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 649.949697] RIP: 0033:0x7f4dc31f604a [ 649.949710] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 649.949727] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 649.949744] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 649.949756] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 649.949767] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 649.949778] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 649.949788] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 649.949812] 15:52:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 4) 15:52:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 30) 15:52:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 12) [ 649.997945] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:52:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 32) 15:52:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 10) 15:52:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 34) 15:52:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 34) [ 650.096317] FAULT_INJECTION: forcing a failure. [ 650.096317] name failslab, interval 1, probability 0, space 0, times 0 [ 650.098071] CPU: 0 UID: 0 PID: 6187 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 650.098106] Tainted: [W]=WARN [ 650.098113] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 650.098143] Call Trace: [ 650.098150] [ 650.098158] dump_stack_lvl+0xfa/0x120 [ 650.098200] should_fail_ex+0x4d7/0x5e0 [ 650.098230] ? __d_alloc+0x31/0xa10 [ 650.098253] should_failslab+0xc2/0x120 [ 650.098280] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 650.098304] ? __d_lookup+0x255/0x490 [ 650.098343] ? __d_alloc+0x31/0xa10 [ 650.098365] __d_alloc+0x31/0xa10 [ 650.098393] d_alloc+0x4a/0x1e0 [ 650.098420] lookup_one_qstr_excl+0x174/0x270 [ 650.098450] ? mnt_want_write+0x153/0x420 [ 650.098483] filename_create+0x1ca/0x480 [ 650.098504] ? __pfx_filename_create+0x10/0x10 [ 650.098523] ? __virt_addr_valid+0x2e8/0x5d0 [ 650.098571] do_mkdirat+0x9a/0x3d0 [ 650.098597] ? __pfx_do_mkdirat+0x10/0x10 [ 650.098630] __x64_sys_mkdir+0xf3/0x140 [ 650.098654] do_syscall_64+0xbf/0x360 [ 650.098684] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.098707] RIP: 0033:0x7f6bdd3d3c27 [ 650.098723] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 650.098745] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 650.098766] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 650.098781] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 650.098794] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 650.098807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 650.098821] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 650.098851] [ 650.128919] FAULT_INJECTION: forcing a failure. [ 650.128919] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 650.130767] CPU: 1 UID: 0 PID: 6186 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 650.130817] Tainted: [W]=WARN [ 650.130828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 650.130844] Call Trace: [ 650.130852] [ 650.130862] dump_stack_lvl+0xfa/0x120 [ 650.130908] should_fail_ex+0x4d7/0x5e0 [ 650.130942] _copy_from_user+0x30/0xd0 [ 650.130974] memdup_user+0x7e/0xe0 [ 650.130997] strndup_user+0x78/0xe0 [ 650.131022] __x64_sys_mount+0x136/0x300 [ 650.131056] ? __pfx___x64_sys_mount+0x10/0x10 [ 650.131090] do_syscall_64+0xbf/0x360 [ 650.131113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.131137] RIP: 0033:0x7f52aa14d04a [ 650.131154] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 650.131176] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 650.131200] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 650.131216] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 650.131235] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 650.131255] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 650.131272] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 650.131303] [ 650.222435] SELinux: security_context_str_to_sid () failed with errno=-22 [ 650.229062] FAULT_INJECTION: forcing a failure. [ 650.229062] name failslab, interval 1, probability 0, space 0, times 0 [ 650.230772] CPU: 0 UID: 0 PID: 6192 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 650.230808] Tainted: [W]=WARN [ 650.230815] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 650.230828] Call Trace: [ 650.230837] [ 650.230845] dump_stack_lvl+0xfa/0x120 [ 650.230887] should_fail_ex+0x4d7/0x5e0 [ 650.230918] should_failslab+0xc2/0x120 [ 650.230946] __kmalloc_noprof+0xc8/0x6e0 [ 650.230977] ? current_umask+0x12/0x80 [ 650.231002] ? posix_acl_create.part.0+0x2a0/0x480 [ 650.231036] ? security_inode_init_security+0x13d/0x390 [ 650.231068] ? security_inode_init_security+0x13d/0x390 [ 650.231092] security_inode_init_security+0x13d/0x390 [ 650.231118] ? __pfx_ext4_initxattrs+0x10/0x10 [ 650.231150] ? __pfx_security_inode_init_security+0x10/0x10 [ 650.231179] ? crc32c+0x1ae/0x350 [ 650.231206] __ext4_new_inode+0x3452/0x4d70 [ 650.231246] ? __pfx___ext4_new_inode+0x10/0x10 [ 650.231276] ? __pfx___dquot_initialize+0x10/0x10 [ 650.231317] ext4_mkdir+0x331/0xb30 [ 650.231357] ? __pfx_ext4_mkdir+0x10/0x10 [ 650.231386] ? security_inode_permission+0x72/0xe0 [ 650.231424] vfs_mkdir+0x59a/0x8d0 [ 650.231461] do_mkdirat+0x19f/0x3d0 [ 650.231488] ? __pfx_do_mkdirat+0x10/0x10 [ 650.231521] __x64_sys_mkdir+0xf3/0x140 [ 650.231546] do_syscall_64+0xbf/0x360 [ 650.231568] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.231592] RIP: 0033:0x7f6d651fcc27 [ 650.231608] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 650.231630] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 650.231652] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 650.231667] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 650.231688] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 650.231702] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 650.231715] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 650.231746] [ 650.234762] FAULT_INJECTION: forcing a failure. [ 650.234762] name failslab, interval 1, probability 0, space 0, times 0 [ 650.254974] SELinux: security_context_str_to_sid () failed with errno=-22 [ 650.255986] CPU: 1 UID: 0 PID: 6196 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 650.256026] Tainted: [W]=WARN [ 650.256034] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 650.256048] Call Trace: [ 650.256056] [ 650.256065] dump_stack_lvl+0xfa/0x120 [ 650.256106] should_fail_ex+0x4d7/0x5e0 [ 650.256138] should_failslab+0xc2/0x120 [ 650.256166] __kmalloc_noprof+0xc8/0x6e0 [ 650.256198] ? current_umask+0x12/0x80 [ 650.256224] ? posix_acl_create.part.0+0x2a0/0x480 [ 650.256260] ? security_inode_init_security+0x13d/0x390 [ 650.256294] ? security_inode_init_security+0x13d/0x390 [ 650.256318] security_inode_init_security+0x13d/0x390 [ 650.256345] ? __pfx_ext4_initxattrs+0x10/0x10 [ 650.256378] ? __pfx_security_inode_init_security+0x10/0x10 [ 650.256409] ? crc32c+0x1ae/0x350 [ 650.256435] __ext4_new_inode+0x3452/0x4d70 [ 650.256477] ? __pfx___ext4_new_inode+0x10/0x10 [ 650.256507] ? __pfx___dquot_initialize+0x10/0x10 [ 650.256550] ext4_mkdir+0x331/0xb30 [ 650.256592] ? __pfx_ext4_mkdir+0x10/0x10 [ 650.256621] ? security_inode_permission+0x72/0xe0 [ 650.256660] vfs_mkdir+0x59a/0x8d0 [ 650.256708] do_mkdirat+0x19f/0x3d0 [ 650.256735] ? __pfx_do_mkdirat+0x10/0x10 [ 650.256768] __x64_sys_mkdir+0xf3/0x140 [ 650.256794] do_syscall_64+0xbf/0x360 [ 650.256816] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 650.256839] RIP: 0033:0x7f59eeb5ac27 [ 650.256855] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 650.256877] RSP: 002b:00007f59ec0affa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 650.256899] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 650.256913] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 650.256927] RBP: 00007f59ec0b0040 R08: 0000000000000000 R09: 0000000000000000 [ 650.256941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 650.256955] R13: 00000000200000c0 R14: 00007f59ec0b0000 R15: 0000000020000400 [ 650.256986] 15:52:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 14) 15:52:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 13) 15:52:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 31) 15:52:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 33) 15:52:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 5) 15:52:19 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 35) 15:52:19 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 11) 15:52:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 35) [ 660.298896] FAULT_INJECTION: forcing a failure. [ 660.298896] name failslab, interval 1, probability 0, space 0, times 0 [ 660.301016] CPU: 1 UID: 0 PID: 6205 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.301059] Tainted: [W]=WARN [ 660.301068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.301083] Call Trace: [ 660.301092] [ 660.301103] dump_stack_lvl+0xfa/0x120 [ 660.301150] should_fail_ex+0x4d7/0x5e0 [ 660.301186] should_failslab+0xc2/0x120 [ 660.301219] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 660.301249] ? lock_acquire+0x15e/0x2f0 [ 660.301279] ? sidtab_sid2str_get+0x85/0x6f0 [ 660.301313] ? sidtab_sid2str_get+0x17e/0x6f0 [ 660.301355] ? kmemdup_noprof+0x2b/0x60 [ 660.301395] kmemdup_noprof+0x2b/0x60 [ 660.301436] sidtab_sid2str_get+0x17e/0x6f0 [ 660.301478] sidtab_entry_to_string+0x33/0x110 [ 660.301514] security_sid_to_context_core+0x350/0x620 [ 660.301553] selinux_inode_init_security+0x433/0x650 [ 660.301594] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 660.301629] ? trace_kmalloc+0x1f/0xb0 [ 660.301661] ? current_umask+0x12/0x80 [ 660.301700] ? security_inode_init_security+0x13d/0x390 [ 660.301741] security_inode_init_security+0x1e6/0x390 [ 660.301773] ? __pfx_ext4_initxattrs+0x10/0x10 [ 660.301811] ? __pfx_security_inode_init_security+0x10/0x10 [ 660.301847] ? crc32c+0x1ae/0x350 [ 660.301878] __ext4_new_inode+0x3452/0x4d70 [ 660.301928] ? __pfx___ext4_new_inode+0x10/0x10 [ 660.301963] ? __pfx___dquot_initialize+0x10/0x10 [ 660.302015] ext4_mkdir+0x331/0xb30 [ 660.302064] ? __pfx_ext4_mkdir+0x10/0x10 [ 660.302099] ? security_inode_permission+0x72/0xe0 [ 660.302146] vfs_mkdir+0x59a/0x8d0 [ 660.302191] do_mkdirat+0x19f/0x3d0 [ 660.302237] ? __pfx_do_mkdirat+0x10/0x10 [ 660.302277] __x64_sys_mkdir+0xf3/0x140 [ 660.302308] do_syscall_64+0xbf/0x360 [ 660.302335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.302362] RIP: 0033:0x7f6d0c15cc27 [ 660.302382] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.302408] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 660.302434] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 660.302452] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 660.302468] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 660.302484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 660.302500] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 660.302537] [ 660.313367] SELinux: security_context_str_to_sid () failed with errno=-22 [ 660.331863] SELinux: security_context_str_to_sid () failed with errno=-22 [ 660.333184] SELinux: security_context_str_to_sid () failed with errno=-22 [ 660.343607] FAULT_INJECTION: forcing a failure. [ 660.343607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 660.345652] CPU: 1 UID: 0 PID: 6216 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.345696] Tainted: [W]=WARN [ 660.345703] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.345717] Call Trace: [ 660.345725] [ 660.345733] dump_stack_lvl+0xfa/0x120 [ 660.345775] should_fail_ex+0x4d7/0x5e0 [ 660.345806] _copy_from_user+0x30/0xd0 [ 660.345837] copy_mount_options+0x76/0x180 [ 660.345870] __x64_sys_mount+0x1ab/0x300 [ 660.345898] ? __pfx___x64_sys_mount+0x10/0x10 [ 660.345934] do_syscall_64+0xbf/0x360 [ 660.345957] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.345980] RIP: 0033:0x7fadd609d04a [ 660.345998] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.346021] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.346044] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 660.346059] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 660.346074] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 660.346089] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 660.346103] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 660.346134] [ 660.373294] FAULT_INJECTION: forcing a failure. [ 660.373294] name failslab, interval 1, probability 0, space 0, times 0 [ 660.375160] CPU: 1 UID: 0 PID: 6217 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.375196] Tainted: [W]=WARN [ 660.375204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.375217] Call Trace: [ 660.375225] [ 660.375233] dump_stack_lvl+0xfa/0x120 [ 660.375271] should_fail_ex+0x4d7/0x5e0 [ 660.375301] should_failslab+0xc2/0x120 [ 660.375329] __kmalloc_cache_noprof+0x73/0x690 [ 660.375362] ? __might_fault+0xe0/0x190 [ 660.375392] ? copy_mount_options+0x55/0x180 [ 660.375426] ? copy_mount_options+0x55/0x180 [ 660.375454] ? memdup_user+0x95/0xe0 [ 660.375474] copy_mount_options+0x55/0x180 [ 660.375507] __x64_sys_mount+0x1ab/0x300 [ 660.375534] ? __pfx___x64_sys_mount+0x10/0x10 [ 660.375570] do_syscall_64+0xbf/0x360 [ 660.375592] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.375615] RIP: 0033:0x7f52aa14d04a [ 660.375632] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.375655] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.375685] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 660.375700] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 660.375715] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 660.375730] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 660.375744] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 660.375775] [ 660.400092] FAULT_INJECTION: forcing a failure. [ 660.400092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 660.401066] CPU: 0 UID: 0 PID: 6221 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.401086] Tainted: [W]=WARN [ 660.401090] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.401099] Call Trace: [ 660.401104] [ 660.401109] dump_stack_lvl+0xfa/0x120 [ 660.401139] should_fail_ex+0x4d7/0x5e0 [ 660.401158] _copy_from_user+0x30/0xd0 [ 660.401178] copy_mount_options+0x76/0x180 [ 660.401200] __x64_sys_mount+0x1ab/0x300 [ 660.401216] ? __pfx___x64_sys_mount+0x10/0x10 [ 660.401235] do_syscall_64+0xbf/0x360 [ 660.401248] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.401262] RIP: 0033:0x7f4dc31f604a 15:52:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 32) 15:52:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 14) 15:52:20 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 12) [ 660.401272] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.401285] RSP: 002b:00007f4dc0748fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 660.401297] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 660.401305] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 660.401313] RBP: 00007f4dc0749040 R08: 00007f4dc0749040 R09: 0000000020000080 [ 660.401321] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 660.401329] R13: 00000000200000c0 R14: 00007f4dc0749000 R15: 0000000020000400 [ 660.401345] [ 660.426773] vfat: Bad value for 'defcontext' 15:52:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 15) [ 660.444182] SELinux: security_context_str_to_sid () failed with errno=-22 [ 660.445593] SELinux: security_context_str_to_sid () failed with errno=-22 [ 660.468911] FAULT_INJECTION: forcing a failure. [ 660.468911] name failslab, interval 1, probability 0, space 0, times 0 [ 660.469874] CPU: 0 UID: 0 PID: 6225 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.469894] Tainted: [W]=WARN [ 660.469898] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.469906] Call Trace: [ 660.469911] [ 660.469916] dump_stack_lvl+0xfa/0x120 [ 660.469943] should_fail_ex+0x4d7/0x5e0 [ 660.469963] should_failslab+0xc2/0x120 [ 660.469979] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 660.469994] ? lock_acquire+0x15e/0x2f0 [ 660.470009] ? sidtab_sid2str_get+0x85/0x6f0 [ 660.470027] ? sidtab_sid2str_get+0x17e/0x6f0 [ 660.470046] ? kmemdup_noprof+0x2b/0x60 [ 660.470065] kmemdup_noprof+0x2b/0x60 [ 660.470084] sidtab_sid2str_get+0x17e/0x6f0 [ 660.470102] sidtab_entry_to_string+0x33/0x110 [ 660.470119] security_sid_to_context_core+0x350/0x620 [ 660.470137] selinux_inode_init_security+0x433/0x650 [ 660.470156] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 660.470172] ? trace_kmalloc+0x1f/0xb0 [ 660.470187] ? current_umask+0x12/0x80 [ 660.470202] ? security_inode_init_security+0x13d/0x390 [ 660.470229] security_inode_init_security+0x1e6/0x390 [ 660.470243] ? __pfx_ext4_initxattrs+0x10/0x10 [ 660.470262] ? __pfx_security_inode_init_security+0x10/0x10 [ 660.470278] ? crc32c+0x1ae/0x350 [ 660.470293] __ext4_new_inode+0x3452/0x4d70 [ 660.470319] ? __pfx___ext4_new_inode+0x10/0x10 [ 660.470336] ? __pfx___dquot_initialize+0x10/0x10 [ 660.470360] ext4_mkdir+0x331/0xb30 [ 660.470383] ? __pfx_ext4_mkdir+0x10/0x10 [ 660.470399] ? security_inode_permission+0x72/0xe0 [ 660.470420] vfs_mkdir+0x59a/0x8d0 [ 660.470441] do_mkdirat+0x19f/0x3d0 [ 660.470456] ? __pfx_do_mkdirat+0x10/0x10 [ 660.470474] __x64_sys_mkdir+0xf3/0x140 [ 660.470488] do_syscall_64+0xbf/0x360 [ 660.470500] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.470513] RIP: 0033:0x7f6d651fcc27 [ 660.470523] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.470535] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 660.470547] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 660.470555] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 660.470562] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 660.470570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 660.470577] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 660.470594] [ 660.473653] FAULT_INJECTION: forcing a failure. [ 660.473653] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 660.508711] CPU: 1 UID: 0 PID: 6223 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.508750] Tainted: [W]=WARN [ 660.508758] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.508772] Call Trace: [ 660.508781] [ 660.508791] dump_stack_lvl+0xfa/0x120 [ 660.508834] should_fail_ex+0x4d7/0x5e0 [ 660.508867] _copy_from_user+0x30/0xd0 [ 660.508898] memdup_user+0x7e/0xe0 [ 660.508921] strndup_user+0x78/0xe0 [ 660.508943] __x64_sys_mount+0x136/0x300 [ 660.508972] ? __pfx___x64_sys_mount+0x10/0x10 [ 660.509008] do_syscall_64+0xbf/0x360 [ 660.509032] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.509057] RIP: 0033:0x7f7957b2404a [ 660.509075] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.509099] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 660.509122] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 660.509138] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 660.509153] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 660.509168] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 660.509182] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 660.509213] [ 660.533503] FAULT_INJECTION: forcing a failure. [ 660.533503] name failslab, interval 1, probability 0, space 0, times 0 [ 660.534590] CPU: 0 UID: 0 PID: 6226 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 660.534610] Tainted: [W]=WARN [ 660.534615] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 660.534623] Call Trace: [ 660.534627] [ 660.534631] dump_stack_lvl+0xfa/0x120 [ 660.534655] should_fail_ex+0x4d7/0x5e0 [ 660.534676] should_failslab+0xc2/0x120 [ 660.534691] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 660.534706] ? lock_acquire+0x15e/0x2f0 [ 660.534720] ? sidtab_sid2str_get+0x85/0x6f0 [ 660.534737] ? sidtab_sid2str_get+0x17e/0x6f0 [ 660.534757] ? kmemdup_noprof+0x2b/0x60 [ 660.534775] kmemdup_noprof+0x2b/0x60 [ 660.534794] sidtab_sid2str_get+0x17e/0x6f0 [ 660.534813] sidtab_entry_to_string+0x33/0x110 [ 660.534830] security_sid_to_context_core+0x350/0x620 [ 660.534847] selinux_inode_init_security+0x433/0x650 [ 660.534866] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 660.534882] ? trace_kmalloc+0x1f/0xb0 [ 660.534897] ? current_umask+0x12/0x80 [ 660.534910] ? security_inode_init_security+0x13d/0x390 [ 660.534929] security_inode_init_security+0x1e6/0x390 [ 660.534944] ? __pfx_ext4_initxattrs+0x10/0x10 [ 660.534961] ? __pfx_security_inode_init_security+0x10/0x10 [ 660.534978] ? crc32c+0x1ae/0x350 [ 660.534992] __ext4_new_inode+0x3452/0x4d70 [ 660.535015] ? __pfx___ext4_new_inode+0x10/0x10 [ 660.535031] ? __pfx___dquot_initialize+0x10/0x10 [ 660.535054] ext4_mkdir+0x331/0xb30 [ 660.535076] ? __pfx_ext4_mkdir+0x10/0x10 [ 660.535092] ? security_inode_permission+0x72/0xe0 [ 660.535113] vfs_mkdir+0x59a/0x8d0 [ 660.535134] do_mkdirat+0x19f/0x3d0 [ 660.535148] ? __pfx_do_mkdirat+0x10/0x10 [ 660.535166] __x64_sys_mkdir+0xf3/0x140 [ 660.535180] do_syscall_64+0xbf/0x360 [ 660.535191] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 660.535204] RIP: 0033:0x7f59eeb5ac27 [ 660.535214] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 660.535226] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 660.535238] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 660.535246] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 660.535253] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 660.535260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 660.535268] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 660.535285] [ 660.546162] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:52:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 36) 15:52:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 13) 15:52:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 16) 15:52:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 36) 15:52:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 6) 15:52:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 15) 15:52:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 34) 15:52:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 33) [ 669.559625] SELinux: security_context_str_to_sid () failed with errno=-22 [ 669.564392] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 35) [ 669.595593] FAULT_INJECTION: forcing a failure. [ 669.595593] name failslab, interval 1, probability 0, space 0, times 0 [ 669.596586] CPU: 0 UID: 0 PID: 6245 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.596609] Tainted: [W]=WARN [ 669.596613] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.596620] Call Trace: [ 669.596625] [ 669.596629] dump_stack_lvl+0xfa/0x120 [ 669.596654] should_fail_ex+0x4d7/0x5e0 [ 669.596671] ? getname_flags.part.0+0x48/0x540 [ 669.596688] should_failslab+0xc2/0x120 [ 669.596703] kmem_cache_alloc_noprof+0x72/0x690 [ 669.596720] ? getname_flags.part.0+0x48/0x540 [ 669.596736] getname_flags.part.0+0x48/0x540 [ 669.596754] getname_flags+0x95/0xe0 [ 669.596765] user_path_at+0x27/0x90 [ 669.596777] __x64_sys_mount+0x1e9/0x300 [ 669.596792] ? __pfx___x64_sys_mount+0x10/0x10 [ 669.596810] do_syscall_64+0xbf/0x360 [ 669.596822] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.596835] RIP: 0033:0x7f4dc31f604a 15:52:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 16) [ 669.596845] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.596857] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.596869] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 669.596877] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 669.596884] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 669.596892] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 669.596899] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 669.596914] [ 669.597249] SELinux: security_context_str_to_sid () failed with errno=-22 [ 669.610138] FAULT_INJECTION: forcing a failure. [ 669.610138] name failslab, interval 1, probability 0, space 0, times 0 [ 669.618814] CPU: 0 UID: 0 PID: 6246 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.618833] Tainted: [W]=WARN [ 669.618838] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.618845] Call Trace: [ 669.618850] [ 669.618854] dump_stack_lvl+0xfa/0x120 [ 669.618874] should_fail_ex+0x4d7/0x5e0 [ 669.618890] ? ext4_alloc_inode+0x28/0x600 [ 669.618905] should_failslab+0xc2/0x120 [ 669.618920] kmem_cache_alloc_lru_noprof+0x76/0x6a0 [ 669.618936] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 669.618952] ? ext4_alloc_inode+0x28/0x600 [ 669.618966] ext4_alloc_inode+0x28/0x600 [ 669.618981] ? __pfx_ext4_alloc_inode+0x10/0x10 [ 669.618995] alloc_inode+0x67/0x250 [ 669.619011] new_inode+0x1e/0x160 [ 669.619027] __ext4_new_inode+0x35d/0x4d70 [ 669.619046] ? avc_has_perm_noaudit+0x150/0x3d0 [ 669.619068] ? __pfx___ext4_new_inode+0x10/0x10 [ 669.619083] ? __pfx_avc_has_perm+0x10/0x10 [ 669.619101] ? __pfx___dquot_initialize+0x10/0x10 [ 669.619125] ext4_mkdir+0x331/0xb30 [ 669.619147] ? __pfx_ext4_mkdir+0x10/0x10 [ 669.619162] ? security_inode_permission+0x72/0xe0 [ 669.619184] vfs_mkdir+0x59a/0x8d0 [ 669.619203] do_mkdirat+0x19f/0x3d0 [ 669.619217] ? __pfx_do_mkdirat+0x10/0x10 [ 669.619235] __x64_sys_mkdir+0xf3/0x140 [ 669.619248] do_syscall_64+0xbf/0x360 [ 669.619260] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.619272] RIP: 0033:0x7f6bdd3d3c27 [ 669.619281] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.619292] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.619303] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 669.619311] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 669.619318] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 669.619325] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 669.619333] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 669.619349] [ 669.632240] FAULT_INJECTION: forcing a failure. [ 669.632240] name failslab, interval 1, probability 0, space 0, times 0 [ 669.637364] FAULT_INJECTION: forcing a failure. [ 669.637364] name failslab, interval 1, probability 0, space 0, times 0 [ 669.638247] CPU: 1 UID: 0 PID: 6248 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.638288] Tainted: [W]=WARN [ 669.638296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.638322] Call Trace: [ 669.638332] [ 669.638341] dump_stack_lvl+0xfa/0x120 [ 669.638386] should_fail_ex+0x4d7/0x5e0 [ 669.638420] ? getname_flags.part.0+0x48/0x540 [ 669.638454] should_failslab+0xc2/0x120 [ 669.638485] kmem_cache_alloc_noprof+0x72/0x690 [ 669.638521] ? getname_flags.part.0+0x48/0x540 [ 669.638553] getname_flags.part.0+0x48/0x540 [ 669.638591] getname_flags+0x95/0xe0 [ 669.638615] user_path_at+0x27/0x90 [ 669.638639] __x64_sys_mount+0x1e9/0x300 [ 669.638675] ? __pfx___x64_sys_mount+0x10/0x10 [ 669.638712] do_syscall_64+0xbf/0x360 [ 669.638736] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.638762] RIP: 0033:0x7fadd609d04a [ 669.638780] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.638804] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.638827] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 669.638843] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 669.638858] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 669.638873] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 669.638888] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 669.638920] [ 669.642030] FAULT_INJECTION: forcing a failure. [ 669.642030] name failslab, interval 1, probability 0, space 0, times 0 [ 669.642113] CPU: 0 UID: 0 PID: 6250 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.642134] Tainted: [W]=WARN [ 669.642138] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.642146] Call Trace: [ 669.642150] [ 669.642155] dump_stack_lvl+0xfa/0x120 [ 669.642176] should_fail_ex+0x4d7/0x5e0 [ 669.642193] should_failslab+0xc2/0x120 [ 669.642207] __kmalloc_noprof+0xc8/0x6e0 [ 669.642224] ? perf_trace_run_bpf_submit+0xef/0x180 [ 669.642241] ? perf_swevent_event+0x63/0x3f0 [ 669.642257] ? ext4_find_extent+0x7f5/0xa00 [ 669.642275] ? ext4_find_extent+0x7f5/0xa00 [ 669.642289] ext4_find_extent+0x7f5/0xa00 [ 669.642316] ext4_ext_map_blocks+0x1cc/0x5f70 [ 669.642336] ? lock_acquire+0x15e/0x2f0 [ 669.642351] ? fs_reclaim_acquire+0xae/0x150 [ 669.642366] ? lock_is_held_type+0x9e/0x120 [ 669.642389] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 669.642405] ? bdev_getblk+0x84/0xf0 [ 669.642419] ? crc32c+0x1ae/0x350 [ 669.642431] ? look_up_lock_class+0x56/0x150 [ 669.642448] ? register_lock_class+0x41/0x560 [ 669.642464] ? __lock_acquire+0xc65/0x1b70 [ 669.642484] ? lock_acquire+0x15e/0x2f0 [ 669.642497] ? ext4_map_blocks+0x49f/0x14a0 [ 669.642511] ext4_map_query_blocks+0x117/0x890 [ 669.642530] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 669.642547] ? __pfx_down_read+0x10/0x10 [ 669.642559] ? ext4_es_lookup_extent+0xc8/0xb30 [ 669.642581] ext4_map_blocks+0x4b3/0x14a0 [ 669.642596] ? __pfx_ext4_map_blocks+0x10/0x10 [ 669.642608] ? __pfx_ext4_initxattrs+0x10/0x10 [ 669.642624] ? __pfx_security_inode_init_security+0x10/0x10 [ 669.642642] ? crc32c+0x1ae/0x350 [ 669.642653] ? __brelse+0x7f/0xa0 [ 669.642674] ? __ext4_new_inode+0x116/0x4d70 [ 669.642690] ext4_append+0x1b6/0x530 [ 669.642704] ? __pfx_ext4_append+0x10/0x10 [ 669.642719] ? __pfx___ext4_new_inode+0x10/0x10 [ 669.642737] ext4_init_new_dir+0x13c/0x240 [ 669.642753] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 669.642774] ext4_mkdir+0x3c5/0xb30 [ 669.642793] ? __pfx_ext4_mkdir+0x10/0x10 [ 669.642809] ? security_inode_permission+0x72/0xe0 [ 669.642830] vfs_mkdir+0x59a/0x8d0 [ 669.642850] do_mkdirat+0x19f/0x3d0 [ 669.642864] ? __pfx_do_mkdirat+0x10/0x10 [ 669.642882] __x64_sys_mkdir+0xf3/0x140 [ 669.642895] do_syscall_64+0xbf/0x360 [ 669.642907] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.642919] RIP: 0033:0x7f6d0c15cc27 [ 669.642928] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.642939] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.642951] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 669.642959] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 669.642966] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 669.642973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 669.642980] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 669.642997] [ 669.671685] FAULT_INJECTION: forcing a failure. [ 669.671685] name failslab, interval 1, probability 0, space 0, times 0 [ 669.671711] CPU: 0 UID: 0 PID: 6253 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.671729] Tainted: [W]=WARN [ 669.671732] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.671739] Call Trace: [ 669.671743] [ 669.671747] dump_stack_lvl+0xfa/0x120 [ 669.671769] should_fail_ex+0x4d7/0x5e0 [ 669.671785] should_failslab+0xc2/0x120 [ 669.671800] __kmalloc_noprof+0xc8/0x6e0 [ 669.671816] ? perf_trace_run_bpf_submit+0xef/0x180 [ 669.671833] ? perf_swevent_event+0x63/0x3f0 [ 669.671848] ? ext4_find_extent+0x7f5/0xa00 [ 669.671866] ? ext4_find_extent+0x7f5/0xa00 [ 669.671880] ext4_find_extent+0x7f5/0xa00 [ 669.671899] ext4_ext_map_blocks+0x1cc/0x5f70 [ 669.671919] ? lock_acquire+0x15e/0x2f0 [ 669.671934] ? fs_reclaim_acquire+0xae/0x150 [ 669.671949] ? lock_is_held_type+0x9e/0x120 [ 669.671971] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 669.671986] ? bdev_getblk+0x84/0xf0 [ 669.672000] ? crc32c+0x1ae/0x350 [ 669.672013] ? look_up_lock_class+0x56/0x150 [ 669.672030] ? register_lock_class+0x41/0x560 [ 669.672046] ? __lock_acquire+0xc65/0x1b70 [ 669.672066] ? lock_acquire+0x15e/0x2f0 [ 669.672079] ? ext4_map_blocks+0x49f/0x14a0 [ 669.672093] ext4_map_query_blocks+0x117/0x890 [ 669.672113] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 669.672130] ? __pfx_down_read+0x10/0x10 [ 669.672141] ? ext4_es_lookup_extent+0xc8/0xb30 [ 669.672164] ext4_map_blocks+0x4b3/0x14a0 [ 669.672179] ? __pfx_ext4_map_blocks+0x10/0x10 [ 669.672190] ? __pfx_ext4_initxattrs+0x10/0x10 [ 669.672206] ? __pfx_security_inode_init_security+0x10/0x10 [ 669.672224] ? crc32c+0x1ae/0x350 [ 669.672235] ? __brelse+0x7f/0xa0 [ 669.672253] ? __ext4_new_inode+0x116/0x4d70 [ 669.672268] ext4_append+0x1b6/0x530 [ 669.672283] ? __pfx_ext4_append+0x10/0x10 [ 669.672297] ? __pfx___ext4_new_inode+0x10/0x10 [ 669.672315] ext4_init_new_dir+0x13c/0x240 [ 669.672331] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 669.672352] ext4_mkdir+0x3c5/0xb30 [ 669.672371] ? __pfx_ext4_mkdir+0x10/0x10 [ 669.672388] ? security_inode_permission+0x72/0xe0 [ 669.672408] vfs_mkdir+0x59a/0x8d0 [ 669.672428] do_mkdirat+0x19f/0x3d0 [ 669.672442] ? __pfx_do_mkdirat+0x10/0x10 [ 669.672460] __x64_sys_mkdir+0xf3/0x140 [ 669.672473] do_syscall_64+0xbf/0x360 [ 669.672485] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.672497] RIP: 0033:0x7f59eeb5ac27 [ 669.672506] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.672517] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 669.672529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 669.672541] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 669.672548] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 669.672556] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 669.672563] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 669.672579] [ 669.760786] CPU: 1 UID: 0 PID: 6249 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.760827] Tainted: [W]=WARN [ 669.760835] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.760849] Call Trace: [ 669.760859] [ 669.760870] dump_stack_lvl+0xfa/0x120 [ 669.760913] should_fail_ex+0x4d7/0x5e0 [ 669.760945] should_failslab+0xc2/0x120 [ 669.760974] __kmalloc_cache_noprof+0x73/0x690 [ 669.761009] ? __might_fault+0xe0/0x190 [ 669.761038] ? copy_mount_options+0x55/0x180 [ 669.761073] ? copy_mount_options+0x55/0x180 [ 669.761101] ? memdup_user+0x95/0xe0 [ 669.761121] copy_mount_options+0x55/0x180 [ 669.761154] __x64_sys_mount+0x1ab/0x300 [ 669.761181] ? __pfx___x64_sys_mount+0x10/0x10 [ 669.761217] do_syscall_64+0xbf/0x360 [ 669.761240] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.761266] RIP: 0033:0x7f7957b2404a [ 669.761284] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.761307] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.761330] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 669.761345] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 669.761360] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 669.761375] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 669.761388] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 669.761419] [ 669.812191] FAULT_INJECTION: forcing a failure. [ 669.812191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 669.814262] CPU: 1 UID: 0 PID: 6255 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 669.814300] Tainted: [W]=WARN [ 669.814319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 669.814332] Call Trace: [ 669.814340] [ 669.814349] dump_stack_lvl+0xfa/0x120 [ 669.814390] should_fail_ex+0x4d7/0x5e0 [ 669.814421] _copy_from_user+0x30/0xd0 [ 669.814452] copy_mount_options+0x76/0x180 [ 669.814487] __x64_sys_mount+0x1ab/0x300 [ 669.814515] ? __pfx___x64_sys_mount+0x10/0x10 [ 669.814551] do_syscall_64+0xbf/0x360 [ 669.814575] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 669.814599] RIP: 0033:0x7f52aa14d04a [ 669.814617] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 669.814640] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 669.814664] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 669.814686] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 669.814701] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 669.814716] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 669.814730] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 669.814761] [ 669.836643] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 17) 15:52:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 34) 15:52:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 36) 15:52:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 14) 15:52:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 17) 15:52:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 7) 15:52:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 37) 15:52:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 37) [ 679.442301] FAULT_INJECTION: forcing a failure. [ 679.442301] name failslab, interval 1, probability 0, space 0, times 0 [ 679.443284] CPU: 0 UID: 0 PID: 6269 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.443304] Tainted: [W]=WARN [ 679.443308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.443316] Call Trace: [ 679.443321] [ 679.443326] dump_stack_lvl+0xfa/0x120 [ 679.443353] should_fail_ex+0x4d7/0x5e0 [ 679.443371] ? getname_flags.part.0+0x48/0x540 [ 679.443389] should_failslab+0xc2/0x120 [ 679.443405] kmem_cache_alloc_noprof+0x72/0x690 [ 679.443423] ? getname_flags.part.0+0x48/0x540 [ 679.443439] getname_flags.part.0+0x48/0x540 [ 679.443456] getname_flags+0x95/0xe0 [ 679.443468] user_path_at+0x27/0x90 [ 679.443480] __x64_sys_mount+0x1e9/0x300 [ 679.443499] ? __pfx___x64_sys_mount+0x10/0x10 [ 679.443517] do_syscall_64+0xbf/0x360 [ 679.443529] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.443542] RIP: 0033:0x7f52aa14d04a [ 679.443552] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.443564] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 679.443576] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 679.443584] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 679.443591] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 679.443600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 679.443607] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 679.443623] [ 679.458066] vfat: Bad value for 'defcontext' [ 679.479882] SELinux: security_context_str_to_sid () failed with errno=-22 [ 679.484017] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 8) 15:52:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 37) [ 679.496100] SELinux: security_context_str_to_sid () failed with errno=-22 [ 679.507547] FAULT_INJECTION: forcing a failure. [ 679.507547] name failslab, interval 1, probability 0, space 0, times 0 [ 679.508584] CPU: 0 UID: 0 PID: 6268 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.508604] Tainted: [W]=WARN [ 679.508608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.508616] Call Trace: [ 679.508620] [ 679.508624] dump_stack_lvl+0xfa/0x120 [ 679.508653] should_fail_ex+0x4d7/0x5e0 [ 679.508675] should_failslab+0xc2/0x120 [ 679.508691] __kmalloc_noprof+0xc8/0x6e0 [ 679.508709] ? perf_trace_run_bpf_submit+0xef/0x180 [ 679.508726] ? perf_swevent_event+0x63/0x3f0 [ 679.508741] ? ext4_find_extent+0x7f5/0xa00 [ 679.508761] ? ext4_find_extent+0x7f5/0xa00 [ 679.508775] ext4_find_extent+0x7f5/0xa00 [ 679.508794] ext4_ext_map_blocks+0x1cc/0x5f70 [ 679.508815] ? lock_acquire+0x15e/0x2f0 [ 679.508830] ? fs_reclaim_acquire+0xae/0x150 [ 679.508845] ? lock_is_held_type+0x9e/0x120 [ 679.508868] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 679.508884] ? bdev_getblk+0x84/0xf0 [ 679.508898] ? crc32c+0x1ae/0x350 [ 679.508911] ? look_up_lock_class+0x56/0x150 [ 679.508929] ? register_lock_class+0x41/0x560 [ 679.508945] ? __lock_acquire+0xc65/0x1b70 [ 679.508965] ? lock_acquire+0x15e/0x2f0 [ 679.508978] ? ext4_map_blocks+0x49f/0x14a0 [ 679.508993] ext4_map_query_blocks+0x117/0x890 [ 679.509012] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 679.509030] ? __pfx_down_read+0x10/0x10 [ 679.509042] ? ext4_es_lookup_extent+0xc8/0xb30 [ 679.509065] ext4_map_blocks+0x4b3/0x14a0 [ 679.509080] ? __pfx_ext4_map_blocks+0x10/0x10 [ 679.509091] ? __pfx_ext4_initxattrs+0x10/0x10 [ 679.509109] ? __pfx_security_inode_init_security+0x10/0x10 [ 679.509127] ? crc32c+0x1ae/0x350 [ 679.509138] ? __brelse+0x7f/0xa0 [ 679.509156] ? __ext4_new_inode+0x116/0x4d70 [ 679.509172] ext4_append+0x1b6/0x530 [ 679.509188] ? __pfx_ext4_append+0x10/0x10 [ 679.509202] ? __pfx___ext4_new_inode+0x10/0x10 [ 679.509221] ext4_init_new_dir+0x13c/0x240 [ 679.509237] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 679.509259] ext4_mkdir+0x3c5/0xb30 [ 679.509278] ? __pfx_ext4_mkdir+0x10/0x10 [ 679.509293] ? security_inode_permission+0x72/0xe0 [ 679.509315] vfs_mkdir+0x59a/0x8d0 [ 679.509336] do_mkdirat+0x19f/0x3d0 [ 679.509350] ? __pfx_do_mkdirat+0x10/0x10 [ 679.509368] __x64_sys_mkdir+0xf3/0x140 [ 679.509382] do_syscall_64+0xbf/0x360 [ 679.509394] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.509407] RIP: 0033:0x7f6d651fcc27 [ 679.509417] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.509429] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 679.509441] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 679.509450] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 679.509457] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 679.509465] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 679.509472] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 679.509490] [ 679.514184] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 679.533191] FAULT_INJECTION: forcing a failure. [ 679.533191] name failslab, interval 1, probability 0, space 0, times 0 [ 679.553606] CPU: 0 UID: 0 PID: 6279 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.553646] Tainted: [W]=WARN [ 679.553653] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.553672] Call Trace: [ 679.553680] [ 679.553689] dump_stack_lvl+0xfa/0x120 [ 679.553730] should_fail_ex+0x4d7/0x5e0 [ 679.553760] ? security_inode_alloc+0x3e/0x130 [ 679.553789] should_failslab+0xc2/0x120 [ 679.553816] kmem_cache_alloc_noprof+0x72/0x690 [ 679.553838] ? __pfx_map_id_range_down+0x10/0x10 [ 679.553874] ? security_inode_alloc+0x3e/0x130 [ 679.553901] security_inode_alloc+0x3e/0x130 [ 679.553932] inode_init_always_gfp+0xc94/0xff0 [ 679.553961] alloc_inode+0x8d/0x250 [ 679.553990] new_inode+0x1e/0x160 [ 679.554020] __ext4_new_inode+0x35d/0x4d70 [ 679.554055] ? avc_has_perm_noaudit+0x150/0x3d0 [ 679.554095] ? __pfx___ext4_new_inode+0x10/0x10 [ 679.554123] ? __pfx_avc_has_perm+0x10/0x10 [ 679.554157] ? __pfx___dquot_initialize+0x10/0x10 [ 679.554200] ext4_mkdir+0x331/0xb30 [ 679.554242] ? __pfx_ext4_mkdir+0x10/0x10 [ 679.554271] ? security_inode_permission+0x72/0xe0 [ 679.554313] vfs_mkdir+0x59a/0x8d0 [ 679.554351] do_mkdirat+0x19f/0x3d0 [ 679.554377] ? __pfx_do_mkdirat+0x10/0x10 [ 679.554422] __x64_sys_mkdir+0xf3/0x140 [ 679.554448] do_syscall_64+0xbf/0x360 [ 679.554471] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.554494] RIP: 0033:0x7f6bdd3d3c27 [ 679.554513] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.554535] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 679.554557] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 679.554572] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 679.554585] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 679.554599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 679.554612] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 679.554643] [ 679.595243] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 38) 15:52:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 35) [ 679.632732] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 15) 15:52:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 38) 15:52:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 9) [ 679.728857] FAULT_INJECTION: forcing a failure. [ 679.728857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 679.730728] CPU: 1 UID: 0 PID: 6283 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.730766] Tainted: [W]=WARN [ 679.730774] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.730788] Call Trace: [ 679.730796] [ 679.730805] dump_stack_lvl+0xfa/0x120 [ 679.730850] should_fail_ex+0x4d7/0x5e0 [ 679.730882] strncpy_from_user+0x3b/0x2f0 [ 679.730922] getname_flags.part.0+0x8d/0x540 [ 679.730959] getname_flags+0x95/0xe0 [ 679.730982] user_path_at+0x27/0x90 [ 679.731005] __x64_sys_mount+0x1e9/0x300 [ 679.731034] ? __pfx___x64_sys_mount+0x10/0x10 [ 679.731069] do_syscall_64+0xbf/0x360 [ 679.731092] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.731117] RIP: 0033:0x7f4dc31f604a [ 679.731134] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.731158] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 679.731180] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 679.731196] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 679.731211] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 679.731226] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 679.731240] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 679.731271] [ 679.758421] FAULT_INJECTION: forcing a failure. [ 679.758421] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 679.760197] CPU: 1 UID: 0 PID: 6284 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.760233] Tainted: [W]=WARN [ 679.760240] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.760252] Call Trace: [ 679.760260] [ 679.760269] dump_stack_lvl+0xfa/0x120 [ 679.760305] should_fail_ex+0x4d7/0x5e0 [ 679.760334] _copy_from_user+0x30/0xd0 [ 679.760365] copy_mount_options+0x76/0x180 [ 679.760398] __x64_sys_mount+0x1ab/0x300 [ 679.760424] ? __pfx___x64_sys_mount+0x10/0x10 [ 679.760459] do_syscall_64+0xbf/0x360 [ 679.760482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.760504] RIP: 0033:0x7f7957b2404a [ 679.760522] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.760544] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 679.760566] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 679.760581] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 679.760596] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 679.760610] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 679.760625] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 679.760654] 15:52:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 18) 15:52:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 18) [ 679.800284] vfat: Bad value for 'defcontext' [ 679.814910] FAULT_INJECTION: forcing a failure. [ 679.814910] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 679.816851] CPU: 0 UID: 0 PID: 6288 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.816889] Tainted: [W]=WARN [ 679.816897] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.816911] Call Trace: [ 679.816918] [ 679.816927] dump_stack_lvl+0xfa/0x120 [ 679.816969] should_fail_ex+0x4d7/0x5e0 [ 679.817000] strncpy_from_user+0x3b/0x2f0 [ 679.817040] getname_flags.part.0+0x8d/0x540 [ 679.817077] getname_flags+0x95/0xe0 [ 679.817101] user_path_at+0x27/0x90 [ 679.817125] __x64_sys_mount+0x1e9/0x300 [ 679.817153] ? __pfx___x64_sys_mount+0x10/0x10 [ 679.817189] do_syscall_64+0xbf/0x360 [ 679.817212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.817237] RIP: 0033:0x7fadd609d04a [ 679.817255] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.817278] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 679.817301] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 679.817317] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 679.817331] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 679.817346] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 679.817360] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 679.817391] [ 679.853017] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 39) [ 679.875085] SELinux: security_context_str_to_sid () failed with errno=-22 [ 679.886141] FAULT_INJECTION: forcing a failure. [ 679.886141] name failslab, interval 1, probability 0, space 0, times 0 [ 679.887983] CPU: 1 UID: 0 PID: 6293 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 679.888018] Tainted: [W]=WARN [ 679.888026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 679.888040] Call Trace: [ 679.888047] [ 679.888055] dump_stack_lvl+0xfa/0x120 [ 679.888099] should_fail_ex+0x4d7/0x5e0 [ 679.888130] ? __es_insert_extent+0xed2/0x1370 [ 679.888162] should_failslab+0xc2/0x120 [ 679.888190] kmem_cache_alloc_noprof+0x72/0x690 [ 679.888223] ? __es_insert_extent+0xed2/0x1370 [ 679.888254] __es_insert_extent+0xed2/0x1370 [ 679.888288] ? __pfx_do_raw_write_lock+0x10/0x10 [ 679.888331] ext4_es_insert_extent+0x4d0/0x1100 [ 679.888375] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 679.888416] ? lock_acquire+0x15e/0x2f0 [ 679.888443] ? find_held_lock+0x2b/0x80 [ 679.888476] ? ext4_es_find_extent_range+0x1cf/0x510 [ 679.888510] ? lock_release+0xc8/0x290 [ 679.888537] ? do_raw_read_unlock+0x44/0xe0 [ 679.888574] ext4_ext_map_blocks+0x178d/0x5f70 [ 679.888613] ? lock_acquire+0x15e/0x2f0 [ 679.888636] ? fs_reclaim_acquire+0xae/0x150 [ 679.888663] ? lock_is_held_type+0x9e/0x120 [ 679.888712] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 679.888741] ? bdev_getblk+0x84/0xf0 [ 679.888767] ? look_up_lock_class+0x56/0x150 [ 679.888799] ? register_lock_class+0x41/0x560 [ 679.888827] ? register_lock_class+0x41/0x560 [ 679.888857] ? __lock_acquire+0xc65/0x1b70 [ 679.888894] ? lock_acquire+0x15e/0x2f0 [ 679.888918] ? ext4_map_blocks+0x49f/0x14a0 [ 679.888945] ext4_map_query_blocks+0x117/0x890 [ 679.888981] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 679.889014] ? __pfx_down_read+0x10/0x10 [ 679.889034] ? ext4_es_lookup_extent+0xc8/0xb30 [ 679.889076] ext4_map_blocks+0x4b3/0x14a0 [ 679.889105] ? __pfx_ext4_map_blocks+0x10/0x10 [ 679.889126] ? __pfx_ext4_initxattrs+0x10/0x10 [ 679.889158] ? __pfx_security_inode_init_security+0x10/0x10 [ 679.889190] ? crc32c+0x1ae/0x350 [ 679.889212] ? __brelse+0x7f/0xa0 [ 679.889245] ? __ext4_new_inode+0x116/0x4d70 [ 679.889275] ext4_append+0x1b6/0x530 [ 679.889303] ? __pfx_ext4_append+0x10/0x10 [ 679.889330] ? __pfx___ext4_new_inode+0x10/0x10 [ 679.889364] ext4_init_new_dir+0x13c/0x240 [ 679.889394] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 679.889435] ext4_mkdir+0x3c5/0xb30 [ 679.889471] ? __pfx_ext4_mkdir+0x10/0x10 [ 679.889500] ? security_inode_permission+0x72/0xe0 [ 679.889539] vfs_mkdir+0x59a/0x8d0 [ 679.889578] do_mkdirat+0x19f/0x3d0 [ 679.889604] ? __pfx_do_mkdirat+0x10/0x10 [ 679.889638] __x64_sys_mkdir+0xf3/0x140 [ 679.889663] do_syscall_64+0xbf/0x360 [ 679.889685] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 679.889709] RIP: 0033:0x7f6d0c15cc27 [ 679.889726] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 679.889748] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 679.889769] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 679.889784] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 679.889798] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 679.889812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 679.889825] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 679.889857] 15:52:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 39) 15:52:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 16) 15:52:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 38) [ 679.995101] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 680.022368] FAULT_INJECTION: forcing a failure. [ 680.022368] name failslab, interval 1, probability 0, space 0, times 0 [ 680.024133] CPU: 0 UID: 0 PID: 6297 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 680.024170] Tainted: [W]=WARN [ 680.024178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.024191] Call Trace: [ 680.024199] [ 680.024209] dump_stack_lvl+0xfa/0x120 [ 680.024251] should_fail_ex+0x4d7/0x5e0 [ 680.024282] should_failslab+0xc2/0x120 [ 680.024311] __kmalloc_cache_noprof+0x73/0x690 15:52:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 36) 15:52:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 10) [ 680.024345] ? find_held_lock+0x2b/0x80 [ 680.024381] ? __get_fs_type+0xe6/0x160 [ 680.024406] ? alloc_fs_context+0x58/0x9e0 [ 680.024449] ? alloc_fs_context+0x58/0x9e0 [ 680.024484] ? _raw_read_unlock+0x1e/0x40 [ 680.024513] alloc_fs_context+0x58/0x9e0 [ 680.024557] path_mount+0xac7/0x1dd0 [ 680.024584] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 680.024611] ? __pfx_path_mount+0x10/0x10 [ 680.024637] ? kmem_cache_free+0x2a1/0x540 [ 680.024657] ? putname.part.0+0x11b/0x160 [ 680.024697] ? getname_flags.part.0+0x1c6/0x540 [ 680.024732] ? putname.part.0+0x11b/0x160 [ 680.024767] __x64_sys_mount+0x27b/0x300 [ 680.024793] ? __pfx___x64_sys_mount+0x10/0x10 [ 680.024829] do_syscall_64+0xbf/0x360 [ 680.024852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.024877] RIP: 0033:0x7fadd609d04a [ 680.024895] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.024917] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.024940] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 680.024955] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 680.024970] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 680.024985] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 680.025000] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 680.025030] [ 680.082006] FAULT_INJECTION: forcing a failure. [ 680.082006] name failslab, interval 1, probability 0, space 0, times 0 [ 680.083723] CPU: 0 UID: 0 PID: 6298 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 680.083761] Tainted: [W]=WARN [ 680.083768] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.083782] Call Trace: [ 680.083790] [ 680.083799] dump_stack_lvl+0xfa/0x120 [ 680.083840] should_fail_ex+0x4d7/0x5e0 [ 680.083872] should_failslab+0xc2/0x120 [ 680.083899] __kmalloc_cache_noprof+0x73/0x690 [ 680.083934] ? find_held_lock+0x2b/0x80 [ 680.083969] ? __get_fs_type+0xe6/0x160 [ 680.083994] ? alloc_fs_context+0x58/0x9e0 [ 680.084036] ? alloc_fs_context+0x58/0x9e0 [ 680.084070] ? _raw_read_unlock+0x1e/0x40 [ 680.084099] alloc_fs_context+0x58/0x9e0 [ 680.084143] path_mount+0xac7/0x1dd0 [ 680.084169] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 680.084196] ? __pfx_path_mount+0x10/0x10 [ 680.084222] ? kmem_cache_free+0x2a1/0x540 [ 680.084242] ? putname.part.0+0x11b/0x160 [ 680.084274] ? getname_flags.part.0+0x1c6/0x540 [ 680.084310] ? putname.part.0+0x11b/0x160 [ 680.084345] __x64_sys_mount+0x27b/0x300 [ 680.084372] ? __pfx___x64_sys_mount+0x10/0x10 [ 680.084408] do_syscall_64+0xbf/0x360 [ 680.084431] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.084455] RIP: 0033:0x7f4dc31f604a [ 680.084472] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.084495] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.084518] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 680.084534] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 680.084548] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 680.084563] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 680.084578] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 680.084609] [ 680.119323] FAULT_INJECTION: forcing a failure. [ 680.119323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 680.119943] SELinux: security_context_str_to_sid () failed with errno=-22 [ 680.121491] CPU: 1 UID: 0 PID: 6301 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 680.121532] Tainted: [W]=WARN [ 680.121540] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.121555] Call Trace: [ 680.121563] [ 680.121571] dump_stack_lvl+0xfa/0x120 [ 680.121617] should_fail_ex+0x4d7/0x5e0 [ 680.121650] strncpy_from_user+0x3b/0x2f0 [ 680.121700] getname_flags.part.0+0x8d/0x540 [ 680.121738] getname_flags+0x95/0xe0 [ 680.121761] user_path_at+0x27/0x90 [ 680.121785] __x64_sys_mount+0x1e9/0x300 [ 680.121814] ? __pfx___x64_sys_mount+0x10/0x10 [ 680.121850] do_syscall_64+0xbf/0x360 [ 680.121874] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.121899] RIP: 0033:0x7f52aa14d04a [ 680.121917] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.121940] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.121963] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 680.121979] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 680.121995] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 680.122010] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 680.122025] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 680.122056] [ 680.170549] SELinux: security_context_str_to_sid () failed with errno=-22 [ 680.179597] vfat: Bad value for 'defcontext' [ 680.213486] FAULT_INJECTION: forcing a failure. [ 680.213486] name failslab, interval 1, probability 0, space 0, times 0 [ 680.217944] CPU: 1 UID: 0 PID: 6307 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 680.217984] Tainted: [W]=WARN [ 680.217991] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 680.218005] Call Trace: [ 680.218013] [ 680.218022] dump_stack_lvl+0xfa/0x120 [ 680.218067] should_fail_ex+0x4d7/0x5e0 [ 680.218099] ? getname_flags.part.0+0x48/0x540 [ 680.218133] should_failslab+0xc2/0x120 [ 680.218161] kmem_cache_alloc_noprof+0x72/0x690 [ 680.218196] ? getname_flags.part.0+0x48/0x540 [ 680.218226] getname_flags.part.0+0x48/0x540 [ 680.218262] getname_flags+0x95/0xe0 [ 680.218285] user_path_at+0x27/0x90 [ 680.218309] __x64_sys_mount+0x1e9/0x300 [ 680.218338] ? __pfx___x64_sys_mount+0x10/0x10 [ 680.218374] do_syscall_64+0xbf/0x360 [ 680.218398] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 680.218435] RIP: 0033:0x7f7957b2404a [ 680.218453] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 680.218477] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 680.218500] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 680.218516] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 680.218531] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 680.218548] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 680.218564] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 680.218595] 15:52:49 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 19) 15:52:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 37) 15:52:49 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 40) 15:52:49 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 11) 15:52:49 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 39) 15:52:49 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 40) 15:52:49 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 19) 15:52:49 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 17) [ 690.373539] SELinux: security_context_str_to_sid () failed with errno=-22 [ 690.376539] SELinux: security_context_str_to_sid () failed with errno=-22 [ 690.381285] SELinux: security_context_str_to_sid () failed with errno=-22 [ 690.392756] vfat: Bad value for 'defcontext' [ 690.408137] FAULT_INJECTION: forcing a failure. [ 690.408137] name failslab, interval 1, probability 0, space 0, times 0 [ 690.409780] CPU: 1 UID: 0 PID: 6328 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 690.409815] Tainted: [W]=WARN [ 690.409822] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 690.409835] Call Trace: [ 690.409843] [ 690.409852] dump_stack_lvl+0xfa/0x120 [ 690.409895] should_fail_ex+0x4d7/0x5e0 [ 690.409926] should_failslab+0xc2/0x120 [ 690.409954] __kmalloc_cache_noprof+0x73/0x690 [ 690.409987] ? find_held_lock+0x2b/0x80 [ 690.410020] ? __get_fs_type+0xe6/0x160 [ 690.410045] ? alloc_fs_context+0x58/0x9e0 [ 690.410085] ? alloc_fs_context+0x58/0x9e0 [ 690.410117] ? _raw_read_unlock+0x1e/0x40 [ 690.410145] alloc_fs_context+0x58/0x9e0 [ 690.410185] path_mount+0xac7/0x1dd0 [ 690.410211] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 690.410238] ? __pfx_path_mount+0x10/0x10 [ 690.410261] ? kmem_cache_free+0x2a1/0x540 [ 690.410280] ? putname.part.0+0x11b/0x160 [ 690.410311] ? getname_flags.part.0+0x1c6/0x540 [ 690.410344] ? putname.part.0+0x11b/0x160 [ 690.410377] __x64_sys_mount+0x27b/0x300 [ 690.410402] ? __pfx___x64_sys_mount+0x10/0x10 [ 690.410436] do_syscall_64+0xbf/0x360 [ 690.410458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.410481] RIP: 0033:0x7f52aa14d04a [ 690.410498] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 15:52:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 20) [ 690.410533] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 690.410554] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 690.410569] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 690.410583] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 690.410597] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 690.410611] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 690.410640] [ 690.414221] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 18) [ 690.415282] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 690.475523] FAULT_INJECTION: forcing a failure. [ 690.475523] name failslab, interval 1, probability 0, space 0, times 0 [ 690.477409] CPU: 1 UID: 0 PID: 6329 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 690.477449] Tainted: [W]=WARN [ 690.477457] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 690.477472] Call Trace: [ 690.477480] [ 690.477490] dump_stack_lvl+0xfa/0x120 [ 690.477535] should_fail_ex+0x4d7/0x5e0 [ 690.477569] should_failslab+0xc2/0x120 [ 690.477600] __kmalloc_cache_noprof+0x73/0x690 [ 690.477636] ? find_held_lock+0x2b/0x80 15:52:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 41) [ 690.477681] ? __get_fs_type+0xe6/0x160 [ 690.477709] ? alloc_fs_context+0x58/0x9e0 [ 690.477754] ? alloc_fs_context+0x58/0x9e0 [ 690.477791] ? _raw_read_unlock+0x1e/0x40 [ 690.477823] alloc_fs_context+0x58/0x9e0 [ 690.477869] path_mount+0xac7/0x1dd0 [ 690.477899] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 690.477928] ? __pfx_path_mount+0x10/0x10 [ 690.477956] ? kmem_cache_free+0x2a1/0x540 [ 690.477978] ? putname.part.0+0x11b/0x160 [ 690.478012] ? getname_flags.part.0+0x1c6/0x540 [ 690.478049] ? putname.part.0+0x11b/0x160 [ 690.478086] __x64_sys_mount+0x27b/0x300 [ 690.478115] ? __pfx___x64_sys_mount+0x10/0x10 [ 690.478153] do_syscall_64+0xbf/0x360 [ 690.478178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.478204] RIP: 0033:0x7f4dc31f604a [ 690.478222] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.478247] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 690.478271] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 690.478288] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 690.478304] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 690.478321] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 690.478336] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 690.478369] 15:52:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 12) 15:52:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 38) 15:52:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 40) [ 690.549858] FAULT_INJECTION: forcing a failure. [ 690.549858] name failslab, interval 1, probability 0, space 0, times 0 [ 690.551100] CPU: 0 UID: 0 PID: 6333 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 690.551127] Tainted: [W]=WARN [ 690.551132] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 690.551142] Call Trace: [ 690.551148] [ 690.551154] dump_stack_lvl+0xfa/0x120 [ 690.551186] should_fail_ex+0x4d7/0x5e0 [ 690.551209] should_failslab+0xc2/0x120 [ 690.551231] __kmalloc_noprof+0xc8/0x6e0 [ 690.551255] ? perf_trace_run_bpf_submit+0xef/0x180 [ 690.551277] ? ext4_find_extent+0x7f5/0xa00 [ 690.551303] ? ext4_find_extent+0x7f5/0xa00 [ 690.551322] ext4_find_extent+0x7f5/0xa00 [ 690.551348] ext4_ext_map_blocks+0x1cc/0x5f70 [ 690.551379] ? finish_task_switch.isra.0+0x206/0x840 [ 690.551408] ? trace_sched_exit_tp+0xbf/0x100 [ 690.551434] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 690.551460] ? look_up_lock_class+0x56/0x150 [ 690.551490] ? lock_acquire+0x15e/0x2f0 [ 690.551508] ? ext4_map_blocks+0x55b/0x14a0 [ 690.551533] ? down_write+0x119/0x1f0 [ 690.551548] ? __pfx_down_write+0x10/0x10 [ 690.551560] ? ext4_es_lookup_extent+0xc8/0xb30 [ 690.551591] ext4_map_blocks+0x624/0x14a0 [ 690.551609] ? __up_read+0x197/0x750 [ 690.551630] ? __pfx_ext4_map_blocks+0x10/0x10 [ 690.551645] ? __pfx___up_read+0x10/0x10 [ 690.551671] ? lock_release+0xc8/0x290 [ 690.551693] ? ext4_map_blocks+0x1e0/0x14a0 [ 690.551713] ext4_getblk+0x682/0x8e0 [ 690.551730] ? __pfx_ext4_getblk+0x10/0x10 [ 690.551744] ? __pfx_security_inode_init_security+0x10/0x10 [ 690.551767] ? crc32c+0x1ae/0x350 [ 690.551789] ext4_bread+0x2e/0x1a0 [ 690.551805] ext4_append+0x224/0x530 [ 690.551826] ? __pfx_ext4_append+0x10/0x10 [ 690.551845] ? __pfx___ext4_new_inode+0x10/0x10 [ 690.551870] ext4_init_new_dir+0x13c/0x240 [ 690.551892] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 690.551921] ext4_mkdir+0x3c5/0xb30 [ 690.551947] ? __pfx_ext4_mkdir+0x10/0x10 [ 690.551968] ? security_inode_permission+0x72/0xe0 [ 690.551996] vfs_mkdir+0x59a/0x8d0 [ 690.552024] do_mkdirat+0x19f/0x3d0 [ 690.552043] ? __pfx_do_mkdirat+0x10/0x10 [ 690.552067] __x64_sys_mkdir+0xf3/0x140 [ 690.552085] do_syscall_64+0xbf/0x360 [ 690.552101] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.552118] RIP: 0033:0x7f59eeb5ac27 [ 690.552130] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.552146] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 690.552162] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 690.552173] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 690.552183] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 690.552193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 690.552203] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 690.552225] [ 690.616187] FAULT_INJECTION: forcing a failure. [ 690.616187] name failslab, interval 1, probability 0, space 0, times 0 [ 690.616922] FAULT_INJECTION: forcing a failure. 15:52:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 20) [ 690.616922] name failslab, interval 1, probability 0, space 0, times 0 [ 690.617367] CPU: 0 UID: 0 PID: 6339 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 690.617391] Tainted: [W]=WARN [ 690.617396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 690.617406] Call Trace: [ 690.617411] [ 690.617417] dump_stack_lvl+0xfa/0x120 [ 690.617446] should_fail_ex+0x4d7/0x5e0 [ 690.617467] should_failslab+0xc2/0x120 [ 690.617486] __kmalloc_noprof+0xc8/0x6e0 [ 690.617508] ? current_umask+0x12/0x80 [ 690.617526] ? posix_acl_create.part.0+0x2a0/0x480 [ 690.617550] ? security_inode_init_security+0x13d/0x390 [ 690.617573] ? security_inode_init_security+0x13d/0x390 [ 690.617589] security_inode_init_security+0x13d/0x390 [ 690.617608] ? __pfx_ext4_initxattrs+0x10/0x10 [ 690.617630] ? __pfx_security_inode_init_security+0x10/0x10 [ 690.617651] ? crc32c+0x1ae/0x350 [ 690.617674] __ext4_new_inode+0x3452/0x4d70 [ 690.617702] ? __pfx___ext4_new_inode+0x10/0x10 [ 690.617723] ? __pfx___dquot_initialize+0x10/0x10 [ 690.617753] ext4_mkdir+0x331/0xb30 [ 690.617781] ? __pfx_ext4_mkdir+0x10/0x10 [ 690.617801] ? security_inode_permission+0x72/0xe0 [ 690.617828] vfs_mkdir+0x59a/0x8d0 [ 690.617854] do_mkdirat+0x19f/0x3d0 [ 690.617872] ? __pfx_do_mkdirat+0x10/0x10 [ 690.617895] __x64_sys_mkdir+0xf3/0x140 [ 690.617913] do_syscall_64+0xbf/0x360 [ 690.617928] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.617944] RIP: 0033:0x7f6bdd3d3c27 [ 690.617955] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.617970] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 690.617985] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 690.617995] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 690.618004] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 690.618014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 690.618023] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 690.618045] [ 690.648539] CPU: 1 UID: 0 PID: 6332 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 690.648575] Tainted: [W]=WARN [ 690.648582] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 690.648594] Call Trace: [ 690.648601] [ 690.648610] dump_stack_lvl+0xfa/0x120 [ 690.648645] should_fail_ex+0x4d7/0x5e0 [ 690.648680] should_failslab+0xc2/0x120 [ 690.648706] __kmalloc_noprof+0xc8/0x6e0 [ 690.648739] ? ext4_find_extent+0x7f5/0xa00 [ 690.648773] ? ext4_find_extent+0x7f5/0xa00 [ 690.648800] ext4_find_extent+0x7f5/0xa00 [ 690.648835] ext4_ext_map_blocks+0x1cc/0x5f70 [ 690.648876] ? lock_acquire+0x15e/0x2f0 [ 690.648902] ? fs_reclaim_acquire+0xae/0x150 [ 690.648929] ? lock_is_held_type+0x9e/0x120 [ 690.648966] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 690.649004] ? crc32c+0x1ae/0x350 [ 690.649028] ? lock_acquire+0x15e/0x2f0 [ 690.649052] ? ext4_map_blocks+0x55b/0x14a0 [ 690.649085] ? down_write+0x119/0x1f0 [ 690.649105] ? __pfx_down_write+0x10/0x10 [ 690.649123] ? ext4_es_lookup_extent+0xc8/0xb30 [ 690.649166] ext4_map_blocks+0x624/0x14a0 [ 690.649192] ? __up_read+0x197/0x750 [ 690.649220] ? __pfx_ext4_map_blocks+0x10/0x10 [ 690.649241] ? __pfx___up_read+0x10/0x10 [ 690.649271] ? lock_release+0xc8/0x290 [ 690.649302] ? ext4_map_blocks+0x1e0/0x14a0 [ 690.649330] ext4_getblk+0x682/0x8e0 [ 690.649353] ? __pfx_ext4_getblk+0x10/0x10 [ 690.649372] ? __pfx_security_inode_init_security+0x10/0x10 [ 690.649403] ? crc32c+0x1ae/0x350 [ 690.649429] ext4_bread+0x2e/0x1a0 [ 690.649452] ext4_append+0x224/0x530 [ 690.649480] ? __pfx_ext4_append+0x10/0x10 [ 690.649507] ? __pfx___ext4_new_inode+0x10/0x10 [ 690.649540] ext4_init_new_dir+0x13c/0x240 [ 690.649570] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 690.649610] ext4_mkdir+0x3c5/0xb30 [ 690.649646] ? __pfx_ext4_mkdir+0x10/0x10 [ 690.649675] ? security_inode_permission+0x72/0xe0 [ 690.649713] vfs_mkdir+0x59a/0x8d0 [ 690.649750] do_mkdirat+0x19f/0x3d0 [ 690.649776] ? __pfx_do_mkdirat+0x10/0x10 [ 690.649809] __x64_sys_mkdir+0xf3/0x140 [ 690.649835] do_syscall_64+0xbf/0x360 [ 690.649856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.649878] RIP: 0033:0x7f6d651fcc27 [ 690.649895] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.649916] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 690.649937] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 690.649952] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 690.649966] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 690.649980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 690.649993] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 690.650025] 15:52:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 13) [ 690.709463] FAULT_INJECTION: forcing a failure. [ 690.709463] name failslab, interval 1, probability 0, space 0, times 0 [ 690.711464] CPU: 1 UID: 0 PID: 6335 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 690.711503] Tainted: [W]=WARN [ 690.711511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 690.711525] Call Trace: [ 690.711533] [ 690.711541] dump_stack_lvl+0xfa/0x120 [ 690.711580] should_fail_ex+0x4d7/0x5e0 [ 690.711612] should_failslab+0xc2/0x120 [ 690.711640] __kmalloc_cache_noprof+0x73/0x690 [ 690.711683] ? __create_object+0x59/0x80 [ 690.711717] ? fat_init_fs_context+0x51/0x5e0 [ 690.711753] ? trace_kmalloc+0x1f/0xb0 [ 690.711785] ? fat_init_fs_context+0x51/0x5e0 [ 690.711819] fat_init_fs_context+0x51/0x5e0 [ 690.711858] vfat_init_fs_context+0x1c/0x70 [ 690.711881] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 690.711904] alloc_fs_context+0x570/0x9e0 [ 690.711951] path_mount+0xac7/0x1dd0 [ 690.711980] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 690.712009] ? __pfx_path_mount+0x10/0x10 [ 690.712035] ? kmem_cache_free+0x2a1/0x540 [ 690.712057] ? putname.part.0+0x11b/0x160 [ 690.712090] ? getname_flags.part.0+0x1c6/0x540 [ 690.712127] ? putname.part.0+0x11b/0x160 [ 690.712163] __x64_sys_mount+0x27b/0x300 [ 690.712191] ? __pfx___x64_sys_mount+0x10/0x10 [ 690.712229] do_syscall_64+0xbf/0x360 [ 690.712253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 690.712277] RIP: 0033:0x7fadd609d04a [ 690.712295] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 690.712319] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 690.712343] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 690.712359] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 690.712374] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 690.712389] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 690.712405] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 690.712437] [ 690.725912] vfat: Bad value for 'defcontext' [ 690.735030] SELinux: security_context_str_to_sid () failed with errno=-22 [ 690.739219] SELinux: security_context_str_to_sid () failed with errno=-22 [ 690.800892] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:52:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 21) 15:52:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 21) 15:52:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 14) 15:52:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 41) 15:52:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 42) 15:52:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 39) 15:52:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 41) [ 699.688180] FAULT_INJECTION: forcing a failure. [ 699.688180] name failslab, interval 1, probability 0, space 0, times 0 15:52:59 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 19) [ 699.690095] CPU: 1 UID: 0 PID: 6354 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 699.690131] Tainted: [W]=WARN [ 699.690139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 699.690152] Call Trace: [ 699.690160] [ 699.690168] dump_stack_lvl+0xfa/0x120 [ 699.690211] should_fail_ex+0x4d7/0x5e0 [ 699.690243] should_failslab+0xc2/0x120 [ 699.690270] __kmalloc_cache_noprof+0x73/0x690 [ 699.690303] ? __create_object+0x59/0x80 [ 699.690333] ? fat_init_fs_context+0x51/0x5e0 [ 699.690366] ? trace_kmalloc+0x1f/0xb0 [ 699.690395] ? fat_init_fs_context+0x51/0x5e0 [ 699.690425] fat_init_fs_context+0x51/0x5e0 [ 699.690460] vfat_init_fs_context+0x1c/0x70 [ 699.690480] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 699.690501] alloc_fs_context+0x570/0x9e0 [ 699.690543] path_mount+0xac7/0x1dd0 [ 699.690569] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 699.690607] ? __pfx_path_mount+0x10/0x10 [ 699.690631] ? kmem_cache_free+0x2a1/0x540 [ 699.690650] ? putname.part.0+0x11b/0x160 [ 699.690688] ? getname_flags.part.0+0x1c6/0x540 [ 699.690721] ? putname.part.0+0x11b/0x160 [ 699.690754] __x64_sys_mount+0x27b/0x300 [ 699.690779] ? __pfx___x64_sys_mount+0x10/0x10 [ 699.690812] do_syscall_64+0xbf/0x360 [ 699.690833] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.690857] RIP: 0033:0x7f52aa14d04a [ 699.690873] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.690895] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 699.690917] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 699.690931] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 699.690945] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 699.690960] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 699.690973] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 699.691002] [ 699.750869] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 699.757394] FAULT_INJECTION: forcing a failure. [ 699.757394] name failslab, interval 1, probability 0, space 0, times 0 [ 699.759274] CPU: 0 UID: 0 PID: 6364 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 699.759311] Tainted: [W]=WARN [ 699.759318] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 699.759333] Call Trace: [ 699.759343] [ 699.759354] dump_stack_lvl+0xfa/0x120 [ 699.759406] should_fail_ex+0x4d7/0x5e0 [ 699.759437] should_failslab+0xc2/0x120 [ 699.759465] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 699.759490] ? lock_acquire+0x15e/0x2f0 [ 699.759526] ? sidtab_sid2str_get+0x85/0x6f0 [ 699.759555] ? sidtab_sid2str_get+0x17e/0x6f0 [ 699.759591] ? kmemdup_noprof+0x2b/0x60 [ 699.759625] kmemdup_noprof+0x2b/0x60 [ 699.759659] sidtab_sid2str_get+0x17e/0x6f0 [ 699.759703] sidtab_entry_to_string+0x33/0x110 [ 699.759734] security_sid_to_context_core+0x350/0x620 [ 699.759779] selinux_inode_init_security+0x433/0x650 [ 699.759823] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 699.759852] ? trace_kmalloc+0x1f/0xb0 [ 699.759886] ? current_umask+0x12/0x80 [ 699.759915] ? security_inode_init_security+0x13d/0x390 [ 699.759949] security_inode_init_security+0x1e6/0x390 [ 699.759976] ? __pfx_ext4_initxattrs+0x10/0x10 [ 699.760008] ? __pfx_security_inode_init_security+0x10/0x10 [ 699.760038] ? crc32c+0x1ae/0x350 [ 699.760064] __ext4_new_inode+0x3452/0x4d70 [ 699.760105] ? __pfx___ext4_new_inode+0x10/0x10 [ 699.760144] ? __pfx___dquot_initialize+0x10/0x10 [ 699.760189] ext4_mkdir+0x331/0xb30 [ 699.760229] ? __pfx_ext4_mkdir+0x10/0x10 [ 699.760259] ? security_inode_permission+0x72/0xe0 [ 699.760297] vfs_mkdir+0x59a/0x8d0 [ 699.760336] do_mkdirat+0x19f/0x3d0 [ 699.760362] ? __pfx_do_mkdirat+0x10/0x10 [ 699.760396] __x64_sys_mkdir+0xf3/0x140 [ 699.760431] do_syscall_64+0xbf/0x360 [ 699.760460] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.760488] RIP: 0033:0x7f6bdd3d3c27 [ 699.760505] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.760527] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 699.760555] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 699.760572] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 699.760585] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 699.760599] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 699.760612] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 699.760644] [ 699.764834] FAULT_INJECTION: forcing a failure. [ 699.764834] name failslab, interval 1, probability 0, space 0, times 0 [ 699.769934] SELinux: security_context_str_to_sid () failed with errno=-22 [ 699.772796] SELinux: security_context_str_to_sid () failed with errno=-22 [ 699.777233] CPU: 1 UID: 0 PID: 6365 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 699.777273] Tainted: [W]=WARN [ 699.777280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 699.777294] Call Trace: [ 699.777300] [ 699.777308] dump_stack_lvl+0xfa/0x120 [ 699.777346] should_fail_ex+0x4d7/0x5e0 [ 699.777374] should_failslab+0xc2/0x120 [ 699.777400] __kmalloc_cache_noprof+0x73/0x690 [ 699.777433] ? __create_object+0x59/0x80 [ 699.777462] ? fat_init_fs_context+0x51/0x5e0 [ 699.777495] ? trace_kmalloc+0x1f/0xb0 [ 699.777524] ? fat_init_fs_context+0x51/0x5e0 [ 699.777554] fat_init_fs_context+0x51/0x5e0 [ 699.777589] vfat_init_fs_context+0x1c/0x70 [ 699.777609] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 699.777630] alloc_fs_context+0x570/0x9e0 [ 699.777679] path_mount+0xac7/0x1dd0 [ 699.777705] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 699.777730] ? __pfx_path_mount+0x10/0x10 [ 699.777754] ? kmem_cache_free+0x2a1/0x540 [ 699.777774] ? putname.part.0+0x11b/0x160 [ 699.777803] ? getname_flags.part.0+0x1c6/0x540 [ 699.777836] ? putname.part.0+0x11b/0x160 [ 699.777869] __x64_sys_mount+0x27b/0x300 [ 699.777894] ? __pfx___x64_sys_mount+0x10/0x10 [ 699.777928] do_syscall_64+0xbf/0x360 [ 699.777950] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.777971] RIP: 0033:0x7f4dc31f604a [ 699.777988] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.778010] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 699.778032] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 699.778046] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 699.778060] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 699.778074] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 699.778087] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 699.778116] [ 699.779504] SELinux: security_context_str_to_sid () failed with errno=-22 [ 699.846645] FAULT_INJECTION: forcing a failure. [ 699.846645] name failslab, interval 1, probability 0, space 0, times 0 [ 699.848348] CPU: 1 UID: 0 PID: 6368 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 699.848383] Tainted: [W]=WARN [ 699.848390] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 699.848402] Call Trace: [ 699.848409] [ 699.848416] dump_stack_lvl+0xfa/0x120 [ 699.848450] should_fail_ex+0x4d7/0x5e0 [ 699.848478] should_failslab+0xc2/0x120 [ 699.848503] __kmalloc_cache_noprof+0x73/0x690 15:52:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 22) [ 699.848534] ? find_held_lock+0x2b/0x80 [ 699.848567] ? __get_fs_type+0xe6/0x160 [ 699.848591] ? alloc_fs_context+0x58/0x9e0 [ 699.848630] ? alloc_fs_context+0x58/0x9e0 [ 699.848662] ? _raw_read_unlock+0x1e/0x40 [ 699.848698] alloc_fs_context+0x58/0x9e0 [ 699.848739] path_mount+0xac7/0x1dd0 [ 699.848763] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 699.848788] ? __pfx_path_mount+0x10/0x10 [ 699.848812] ? kmem_cache_free+0x2a1/0x540 [ 699.848831] ? putname.part.0+0x11b/0x160 [ 699.848861] ? getname_flags.part.0+0x1c6/0x540 [ 699.848894] ? putname.part.0+0x11b/0x160 [ 699.848927] __x64_sys_mount+0x27b/0x300 [ 699.848952] ? __pfx___x64_sys_mount+0x10/0x10 [ 699.848986] do_syscall_64+0xbf/0x360 [ 699.849007] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 699.849028] RIP: 0033:0x7f7957b2404a [ 699.849045] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 699.849067] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 699.849088] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 699.849103] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 699.849117] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 699.849131] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 15:52:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 15) [ 699.849143] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 699.849172] 15:52:59 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 43) 15:52:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 22) 15:52:59 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 42) 15:52:59 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 42) [ 699.997176] FAULT_INJECTION: forcing a failure. [ 699.997176] name failslab, interval 1, probability 0, space 0, times 0 [ 699.998869] CPU: 0 UID: 0 PID: 6372 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 699.998904] Tainted: [W]=WARN [ 699.998912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 699.998925] Call Trace: [ 699.998933] [ 699.998941] dump_stack_lvl+0xfa/0x120 [ 699.998983] should_fail_ex+0x4d7/0x5e0 [ 699.999014] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 699.999036] should_failslab+0xc2/0x120 [ 699.999065] kmem_cache_alloc_noprof+0x72/0x690 [ 699.999087] ? do_raw_spin_unlock+0x53/0x220 [ 699.999126] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 699.999147] ext4_mb_new_blocks+0x64e/0x45b0 [ 699.999178] ? kasan_save_track+0x14/0x30 [ 699.999205] ? __kasan_kmalloc+0x7f/0x90 [ 699.999232] ? trace_kmalloc+0x1f/0xb0 [ 699.999256] ? __kmalloc_noprof+0x29d/0x6e0 [ 699.999289] ? ext4_find_extent+0x7f5/0xa00 [ 699.999318] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 699.999342] ? ext4_ext_search_right+0x2e8/0xbd0 [ 699.999370] ? ext4_inode_to_goal_block+0x323/0x430 [ 699.999400] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 699.999442] ? lock_acquire+0x15e/0x2f0 [ 699.999466] ? fs_reclaim_acquire+0xae/0x150 15:52:59 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 40) [ 699.999492] ? lock_is_held_type+0x9e/0x120 [ 699.999531] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 699.999568] ? crc32c+0x1ae/0x350 [ 699.999593] ? lock_acquire+0x15e/0x2f0 [ 699.999617] ? ext4_map_blocks+0x55b/0x14a0 [ 699.999651] ? __pfx_down_write+0x10/0x10 [ 699.999678] ? ext4_es_lookup_extent+0xc8/0xb30 [ 699.999724] ext4_map_blocks+0x624/0x14a0 [ 699.999750] ? __up_read+0x197/0x750 [ 699.999778] ? __pfx_ext4_map_blocks+0x10/0x10 [ 699.999799] ? __pfx___up_read+0x10/0x10 [ 699.999828] ? lock_release+0xc8/0x290 [ 699.999859] ? ext4_map_blocks+0x1e0/0x14a0 [ 699.999887] ext4_getblk+0x682/0x8e0 [ 699.999910] ? __pfx_ext4_getblk+0x10/0x10 [ 699.999929] ? __pfx_security_inode_init_security+0x10/0x10 [ 699.999961] ? crc32c+0x1ae/0x350 [ 699.999987] ext4_bread+0x2e/0x1a0 [ 700.000009] ext4_append+0x224/0x530 [ 700.000037] ? __pfx_ext4_append+0x10/0x10 [ 700.000063] ? __pfx___ext4_new_inode+0x10/0x10 [ 700.000096] ext4_init_new_dir+0x13c/0x240 [ 700.000127] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 700.000166] ext4_mkdir+0x3c5/0xb30 [ 700.000202] ? __pfx_ext4_mkdir+0x10/0x10 [ 700.000231] ? security_inode_permission+0x72/0xe0 [ 700.000269] vfs_mkdir+0x59a/0x8d0 [ 700.000307] do_mkdirat+0x19f/0x3d0 [ 700.000334] ? __pfx_do_mkdirat+0x10/0x10 [ 700.000367] __x64_sys_mkdir+0xf3/0x140 [ 700.000392] do_syscall_64+0xbf/0x360 [ 700.000414] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.000437] RIP: 0033:0x7f59eeb5ac27 [ 700.000453] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.000475] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.000496] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 700.000511] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 700.000525] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 700.000538] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 700.000552] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 700.000583] [ 700.010183] FAULT_INJECTION: forcing a failure. [ 700.010183] name failslab, interval 1, probability 0, space 0, times 0 [ 700.012095] FAULT_INJECTION: forcing a failure. [ 700.012095] name failslab, interval 1, probability 0, space 0, times 0 [ 700.012175] CPU: 0 UID: 0 PID: 6375 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 700.012207] Tainted: [W]=WARN [ 700.012214] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.012226] Call Trace: [ 700.012232] [ 700.012240] dump_stack_lvl+0xfa/0x120 [ 700.012274] should_fail_ex+0x4d7/0x5e0 [ 700.012303] should_failslab+0xc2/0x120 [ 700.012328] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 700.012352] ? lock_acquire+0x15e/0x2f0 [ 700.012375] ? sidtab_sid2str_get+0x85/0x6f0 [ 700.012404] ? sidtab_sid2str_get+0x17e/0x6f0 [ 700.012438] ? kmemdup_noprof+0x2b/0x60 [ 700.012472] kmemdup_noprof+0x2b/0x60 [ 700.012506] sidtab_sid2str_get+0x17e/0x6f0 [ 700.012540] sidtab_entry_to_string+0x33/0x110 [ 700.012570] security_sid_to_context_core+0x350/0x620 [ 700.012602] selinux_inode_init_security+0x433/0x650 [ 700.012636] ? __pfx_selinux_inode_init_security+0x10/0x10 [ 700.012665] ? trace_kmalloc+0x1f/0xb0 [ 700.012700] ? current_umask+0x12/0x80 [ 700.012726] ? security_inode_init_security+0x13d/0x390 [ 700.012759] security_inode_init_security+0x1e6/0x390 [ 700.012785] ? __pfx_ext4_initxattrs+0x10/0x10 [ 700.012816] ? __pfx_security_inode_init_security+0x10/0x10 [ 700.012846] ? crc32c+0x1ae/0x350 [ 700.012871] __ext4_new_inode+0x3452/0x4d70 [ 700.012911] ? __pfx___ext4_new_inode+0x10/0x10 [ 700.012940] ? perf_trace_drv_channel_switch_beacon+0x41c/0xbc0 [ 700.012977] ? __pfx___dquot_initialize+0x10/0x10 [ 700.013021] ext4_mkdir+0x331/0xb30 [ 700.013060] ? __pfx_ext4_mkdir+0x10/0x10 [ 700.013090] ? security_inode_permission+0x72/0xe0 [ 700.013128] vfs_mkdir+0x59a/0x8d0 [ 700.013165] do_mkdirat+0x19f/0x3d0 [ 700.013191] ? __pfx_do_mkdirat+0x10/0x10 [ 700.013224] __x64_sys_mkdir+0xf3/0x140 [ 700.013250] do_syscall_64+0xbf/0x360 [ 700.013271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.013293] RIP: 0033:0x7f6bdd3d3c27 [ 700.013309] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.013330] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.013351] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 700.013364] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 700.013378] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 700.013391] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 700.013404] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 700.013435] [ 700.032411] FAULT_INJECTION: forcing a failure. [ 700.032411] name failslab, interval 1, probability 0, space 0, times 0 [ 700.032477] CPU: 1 UID: 0 PID: 6374 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 700.032516] Tainted: [W]=WARN [ 700.032523] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.032537] Call Trace: [ 700.032545] [ 700.032554] dump_stack_lvl+0xfa/0x120 [ 700.032595] should_fail_ex+0x4d7/0x5e0 [ 700.032626] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 700.032650] should_failslab+0xc2/0x120 [ 700.032684] kmem_cache_alloc_noprof+0x72/0x690 [ 700.032708] ? do_raw_spin_unlock+0x53/0x220 [ 700.032748] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 700.032769] ext4_mb_new_blocks+0x64e/0x45b0 [ 700.032801] ? kasan_save_track+0x14/0x30 [ 700.032828] ? __kasan_kmalloc+0x7f/0x90 [ 700.032855] ? trace_kmalloc+0x1f/0xb0 [ 700.032881] ? __kmalloc_noprof+0x29d/0x6e0 [ 700.032914] ? ext4_find_extent+0x7f5/0xa00 [ 700.032943] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 700.032968] ? ext4_ext_search_right+0x2e8/0xbd0 [ 700.032996] ? ext4_inode_to_goal_block+0x323/0x430 [ 700.033028] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 700.033069] ? lock_acquire+0x15e/0x2f0 [ 700.033094] ? fs_reclaim_acquire+0xae/0x150 [ 700.033121] ? lock_is_held_type+0x9e/0x120 [ 700.033160] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 700.033197] ? crc32c+0x1ae/0x350 [ 700.033223] ? lock_acquire+0x15e/0x2f0 [ 700.033248] ? ext4_map_blocks+0x55b/0x14a0 [ 700.033283] ? __pfx_down_write+0x10/0x10 [ 700.033303] ? ext4_es_lookup_extent+0xc8/0xb30 [ 700.033345] ext4_map_blocks+0x624/0x14a0 [ 700.033371] ? __up_read+0x197/0x750 [ 700.033400] ? __pfx_ext4_map_blocks+0x10/0x10 [ 700.033421] ? __pfx___up_read+0x10/0x10 [ 700.033451] ? lock_release+0xc8/0x290 [ 700.033482] ? ext4_map_blocks+0x1e0/0x14a0 [ 700.033510] ext4_getblk+0x682/0x8e0 [ 700.033533] ? __pfx_ext4_getblk+0x10/0x10 [ 700.033552] ? __pfx_security_inode_init_security+0x10/0x10 [ 700.033584] ? crc32c+0x1ae/0x350 [ 700.033611] ext4_bread+0x2e/0x1a0 [ 700.033634] ext4_append+0x224/0x530 [ 700.033661] ? __pfx_ext4_append+0x10/0x10 [ 700.033688] ? __pfx___ext4_new_inode+0x10/0x10 [ 700.033723] ext4_init_new_dir+0x13c/0x240 [ 700.033753] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 700.033793] ext4_mkdir+0x3c5/0xb30 [ 700.033829] ? __pfx_ext4_mkdir+0x10/0x10 [ 700.033858] ? security_inode_permission+0x72/0xe0 [ 700.033897] vfs_mkdir+0x59a/0x8d0 [ 700.033935] do_mkdirat+0x19f/0x3d0 [ 700.033962] ? __pfx_do_mkdirat+0x10/0x10 [ 700.033995] __x64_sys_mkdir+0xf3/0x140 [ 700.034021] do_syscall_64+0xbf/0x360 [ 700.034043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.034065] RIP: 0033:0x7f6d0c15cc27 [ 700.034082] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.034103] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.034125] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 700.034140] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 700.034154] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 700.034168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 700.034182] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 700.034213] [ 700.139333] CPU: 0 UID: 0 PID: 6377 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 700.139371] Tainted: [W]=WARN [ 700.139378] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.139391] Call Trace: [ 700.139398] [ 700.139407] dump_stack_lvl+0xfa/0x120 [ 700.139442] should_fail_ex+0x4d7/0x5e0 [ 700.139471] should_failslab+0xc2/0x120 [ 700.139497] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 700.139522] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 700.139552] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 700.139578] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 700.139607] ? kmemdup_nul+0x3b/0xa0 [ 700.139639] kmemdup_nul+0x3b/0xa0 [ 700.139680] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 700.139714] security_sb_eat_lsm_opts+0x42/0x90 [ 700.139747] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 700.139780] vfs_parse_monolithic_sep+0x9c/0x200 [ 700.139817] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 700.139851] ? vfat_init_fs_context+0x55/0x70 [ 700.139873] ? alloc_fs_context+0x5c0/0x9e0 [ 700.139913] path_mount+0x12e5/0x1dd0 [ 700.139939] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 700.139963] ? __pfx_path_mount+0x10/0x10 [ 700.139987] ? kmem_cache_free+0x2a1/0x540 [ 700.140006] ? putname.part.0+0x11b/0x160 [ 700.140037] ? getname_flags.part.0+0x1c6/0x540 [ 700.140070] ? putname.part.0+0x11b/0x160 [ 700.140102] __x64_sys_mount+0x27b/0x300 [ 700.140127] ? __pfx___x64_sys_mount+0x10/0x10 [ 700.140161] do_syscall_64+0xbf/0x360 [ 700.140181] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.140204] RIP: 0033:0x7fadd609d04a [ 700.140220] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.140241] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 700.140263] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 700.140278] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 700.140291] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 700.140305] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 700.140319] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 700.140347] [ 700.173841] FAULT_INJECTION: forcing a failure. [ 700.173841] name failslab, interval 1, probability 0, space 0, times 0 [ 700.175665] CPU: 0 UID: 0 PID: 6378 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 700.175706] Tainted: [W]=WARN [ 700.175713] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.175725] Call Trace: [ 700.175731] [ 700.175740] dump_stack_lvl+0xfa/0x120 [ 700.175773] should_fail_ex+0x4d7/0x5e0 [ 700.175803] should_failslab+0xc2/0x120 [ 700.175830] __kmalloc_cache_noprof+0x73/0x690 [ 700.175864] ? __create_object+0x59/0x80 [ 700.175895] ? fat_init_fs_context+0x51/0x5e0 [ 700.175929] ? trace_kmalloc+0x1f/0xb0 [ 700.175958] ? fat_init_fs_context+0x51/0x5e0 [ 700.175990] fat_init_fs_context+0x51/0x5e0 [ 700.176026] vfat_init_fs_context+0x1c/0x70 [ 700.176046] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 700.176069] alloc_fs_context+0x570/0x9e0 [ 700.176113] path_mount+0xac7/0x1dd0 [ 700.176139] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 700.176165] ? __pfx_path_mount+0x10/0x10 [ 700.176191] ? kmem_cache_free+0x2a1/0x540 [ 700.176211] ? putname.part.0+0x11b/0x160 [ 700.176243] ? getname_flags.part.0+0x1c6/0x540 [ 700.176277] ? putname.part.0+0x11b/0x160 [ 700.176311] __x64_sys_mount+0x27b/0x300 [ 700.176339] ? __pfx___x64_sys_mount+0x10/0x10 [ 700.176374] do_syscall_64+0xbf/0x360 [ 700.176396] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.176420] RIP: 0033:0x7f52aa14d04a [ 700.176437] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.176461] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 700.176484] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 700.176500] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 700.176515] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 700.176533] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 700.176549] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 700.176579] 15:52:59 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 20) 15:52:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 23) [ 700.284282] SELinux: security_context_str_to_sid () failed with errno=-22 15:52:59 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 16) [ 700.315238] SELinux: security_context_str_to_sid () failed with errno=-22 [ 700.329811] FAULT_INJECTION: forcing a failure. [ 700.329811] name failslab, interval 1, probability 0, space 0, times 0 [ 700.331509] CPU: 0 UID: 0 PID: 6384 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 700.331544] Tainted: [W]=WARN [ 700.331552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.331565] Call Trace: [ 700.331572] [ 700.331581] dump_stack_lvl+0xfa/0x120 [ 700.331622] should_fail_ex+0x4d7/0x5e0 [ 700.331652] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 700.331682] should_failslab+0xc2/0x120 [ 700.331709] kmem_cache_alloc_noprof+0x72/0x690 [ 700.331732] ? do_raw_spin_unlock+0x53/0x220 [ 700.331771] ? ext4_mb_new_blocks+0x64e/0x45b0 [ 700.331792] ext4_mb_new_blocks+0x64e/0x45b0 [ 700.331823] ? kasan_save_track+0x14/0x30 [ 700.331853] ? __kasan_kmalloc+0x7f/0x90 [ 700.331883] ? trace_kmalloc+0x1f/0xb0 [ 700.331913] ? __kmalloc_noprof+0x29d/0x6e0 [ 700.331943] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 700.331985] ? ext4_find_extent+0x7f5/0xa00 [ 700.332014] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 700.332040] ? ext4_ext_search_right+0x2e8/0xbd0 [ 700.332069] ? ext4_inode_to_goal_block+0x323/0x430 [ 700.332103] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 700.332143] ? finish_task_switch.isra.0+0x206/0x840 [ 700.332181] ? finish_task_switch.isra.0+0x20f/0x840 [ 700.332216] ? finish_task_switch.isra.0+0x294/0x840 [ 700.332254] ? trace_sched_exit_tp+0xbf/0x100 [ 700.332291] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 700.332328] ? look_up_lock_class+0x56/0x150 [ 700.332364] ? lock_acquire+0x15e/0x2f0 [ 700.332388] ? ext4_map_blocks+0x55b/0x14a0 [ 700.332423] ? __pfx_down_write+0x10/0x10 [ 700.332441] ? ext4_es_lookup_extent+0xc8/0xb30 [ 700.332483] ext4_map_blocks+0x624/0x14a0 [ 700.332509] ? __up_read+0x197/0x750 [ 700.332537] ? __pfx_ext4_map_blocks+0x10/0x10 [ 700.332557] ? __pfx___up_read+0x10/0x10 [ 700.332587] ? lock_release+0xc8/0x290 [ 700.332617] ? ext4_map_blocks+0x1e0/0x14a0 [ 700.332645] ext4_getblk+0x682/0x8e0 [ 700.332668] ? __pfx_ext4_getblk+0x10/0x10 [ 700.332688] ? __pfx_security_inode_init_security+0x10/0x10 [ 700.332719] ? crc32c+0x1ae/0x350 [ 700.332747] ext4_bread+0x2e/0x1a0 [ 700.332769] ext4_append+0x224/0x530 [ 700.332796] ? __pfx_ext4_append+0x10/0x10 [ 700.332823] ? __pfx___ext4_new_inode+0x10/0x10 [ 700.332857] ext4_init_new_dir+0x13c/0x240 [ 700.332887] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 700.332926] ext4_mkdir+0x3c5/0xb30 [ 700.332961] ? __pfx_ext4_mkdir+0x10/0x10 [ 700.332990] ? security_inode_permission+0x72/0xe0 [ 700.333028] vfs_mkdir+0x59a/0x8d0 [ 700.333066] do_mkdirat+0x19f/0x3d0 [ 700.333092] ? __pfx_do_mkdirat+0x10/0x10 [ 700.333125] __x64_sys_mkdir+0xf3/0x140 [ 700.333151] do_syscall_64+0xbf/0x360 [ 700.333172] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.333195] RIP: 0033:0x7f6d651fcc27 [ 700.333212] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.333233] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.333255] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 700.333269] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 700.333282] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 700.333295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 700.333309] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 700.333340] [ 700.372778] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 700.464225] FAULT_INJECTION: forcing a failure. [ 700.464225] name failslab, interval 1, probability 0, space 0, times 0 [ 700.465969] CPU: 1 UID: 0 PID: 6389 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 700.466005] Tainted: [W]=WARN [ 700.466013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 700.466027] Call Trace: [ 700.466035] [ 700.466044] dump_stack_lvl+0xfa/0x120 [ 700.466090] should_fail_ex+0x4d7/0x5e0 [ 700.466123] should_failslab+0xc2/0x120 [ 700.466152] __kmalloc_noprof+0xc8/0x6e0 [ 700.466183] ? __is_insn_slot_addr+0x2e/0x290 [ 700.466218] ? find_held_lock+0x2b/0x80 [ 700.466252] ? ext4_find_extent+0x7f5/0xa00 [ 700.466281] ? __is_insn_slot_addr+0x136/0x290 [ 700.466318] ? ext4_find_extent+0x7f5/0xa00 [ 700.466344] ext4_find_extent+0x7f5/0xa00 [ 700.466380] ext4_ext_map_blocks+0x1cc/0x5f70 [ 700.466418] ? lock_acquire+0x15e/0x2f0 [ 700.466442] ? fs_reclaim_acquire+0xae/0x150 [ 700.466469] ? lock_is_held_type+0x9e/0x120 [ 700.466511] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 700.466540] ? bdev_getblk+0x84/0xf0 [ 700.466566] ? crc32c+0x1ae/0x350 [ 700.466589] ? look_up_lock_class+0x56/0x150 [ 700.466637] ? register_lock_class+0x41/0x560 [ 700.466666] ? __lock_acquire+0xc65/0x1b70 [ 700.466709] ? lock_acquire+0x15e/0x2f0 [ 700.466733] ? ext4_map_blocks+0x49f/0x14a0 [ 700.466760] ext4_map_query_blocks+0x117/0x890 [ 700.466797] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 700.466829] ? __pfx_down_read+0x10/0x10 [ 700.466850] ? ext4_es_lookup_extent+0xc8/0xb30 [ 700.466892] ext4_map_blocks+0x4b3/0x14a0 [ 700.466921] ? __pfx_ext4_map_blocks+0x10/0x10 [ 700.466941] ? __pfx_ext4_initxattrs+0x10/0x10 [ 700.466973] ? __pfx_security_inode_init_security+0x10/0x10 [ 700.467005] ? crc32c+0x1ae/0x350 [ 700.467027] ? __brelse+0x7f/0xa0 [ 700.467058] ? __ext4_new_inode+0x116/0x4d70 [ 700.467088] ext4_append+0x1b6/0x530 [ 700.467116] ? __pfx_ext4_append+0x10/0x10 [ 700.467143] ? __pfx___ext4_new_inode+0x10/0x10 [ 700.467177] ext4_init_new_dir+0x13c/0x240 [ 700.467206] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 700.467247] ext4_mkdir+0x3c5/0xb30 [ 700.467282] ? __pfx_ext4_mkdir+0x10/0x10 [ 700.467311] ? security_inode_permission+0x72/0xe0 [ 700.467350] vfs_mkdir+0x59a/0x8d0 [ 700.467388] do_mkdirat+0x19f/0x3d0 [ 700.467414] ? __pfx_do_mkdirat+0x10/0x10 [ 700.467447] __x64_sys_mkdir+0xf3/0x140 [ 700.467473] do_syscall_64+0xbf/0x360 [ 700.467495] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.467518] RIP: 0033:0x7f6bdd3d3c27 [ 700.467536] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 700.467558] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 700.467580] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 700.467594] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 700.467608] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 700.467621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 700.467635] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 700.467666] 15:53:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 17) 15:53:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 24) 15:53:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 44) 15:53:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 43) 15:53:09 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 23) 15:53:09 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 43) 15:53:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 21) 15:53:09 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 41) [ 709.996242] vfat: Bad value for 'defcontext' [ 709.997356] FAULT_INJECTION: forcing a failure. [ 709.997356] name failslab, interval 1, probability 0, space 0, times 0 [ 709.999177] CPU: 0 UID: 0 PID: 6402 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 709.999214] Tainted: [W]=WARN [ 709.999222] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 709.999237] Call Trace: [ 709.999244] [ 709.999252] dump_stack_lvl+0xfa/0x120 [ 709.999293] should_fail_ex+0x4d7/0x5e0 [ 709.999323] should_failslab+0xc2/0x120 [ 709.999352] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 709.999378] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 709.999407] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 709.999436] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 709.999465] ? kmemdup_nul+0x3b/0xa0 [ 709.999499] kmemdup_nul+0x3b/0xa0 [ 709.999533] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 709.999567] security_sb_eat_lsm_opts+0x42/0x90 [ 709.999602] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 709.999636] vfs_parse_monolithic_sep+0x9c/0x200 [ 709.999682] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 709.999716] ? vfat_init_fs_context+0x55/0x70 [ 709.999738] ? alloc_fs_context+0x5c0/0x9e0 [ 709.999782] path_mount+0x12e5/0x1dd0 [ 709.999809] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 709.999833] ? __pfx_path_mount+0x10/0x10 [ 709.999857] ? kmem_cache_free+0x2a1/0x540 [ 709.999876] ? putname.part.0+0x11b/0x160 [ 709.999906] ? getname_flags.part.0+0x1c6/0x540 [ 709.999939] ? putname.part.0+0x11b/0x160 [ 709.999972] __x64_sys_mount+0x27b/0x300 [ 709.999996] ? __pfx___x64_sys_mount+0x10/0x10 [ 710.000029] do_syscall_64+0xbf/0x360 [ 710.000051] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.000074] RIP: 0033:0x7f52aa14d04a [ 710.000091] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.000112] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 710.000134] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 710.000149] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 710.000162] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 710.000176] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 710.000190] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 710.000218] [ 710.038857] SELinux: security_context_str_to_sid () failed with errno=-22 [ 710.044086] FAULT_INJECTION: forcing a failure. [ 710.044086] name failslab, interval 1, probability 0, space 0, times 0 [ 710.045814] CPU: 1 UID: 0 PID: 6405 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 710.045850] Tainted: [W]=WARN [ 710.045858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 710.045872] Call Trace: [ 710.045880] [ 710.045889] dump_stack_lvl+0xfa/0x120 [ 710.045933] should_fail_ex+0x4d7/0x5e0 [ 710.045965] should_failslab+0xc2/0x120 [ 710.045993] __kmalloc_cache_noprof+0x73/0x690 [ 710.046027] ? __create_object+0x59/0x80 [ 710.046059] ? fat_init_fs_context+0x51/0x5e0 [ 710.046092] ? trace_kmalloc+0x1f/0xb0 [ 710.046122] ? fat_init_fs_context+0x51/0x5e0 [ 710.046152] fat_init_fs_context+0x51/0x5e0 [ 710.046187] vfat_init_fs_context+0x1c/0x70 [ 710.046208] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 710.046228] alloc_fs_context+0x570/0x9e0 [ 710.046270] path_mount+0xac7/0x1dd0 [ 710.046297] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 710.046323] ? __pfx_path_mount+0x10/0x10 [ 710.046347] ? kmem_cache_free+0x2a1/0x540 [ 710.046366] ? putname.part.0+0x11b/0x160 [ 710.046397] ? getname_flags.part.0+0x1c6/0x540 [ 710.046429] ? putname.part.0+0x11b/0x160 [ 710.046462] __x64_sys_mount+0x27b/0x300 [ 710.046487] ? __pfx___x64_sys_mount+0x10/0x10 [ 710.046520] do_syscall_64+0xbf/0x360 [ 710.046543] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.046566] RIP: 0033:0x7f7957b2404a [ 710.046583] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.046605] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 710.046627] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 710.046642] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 710.046655] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 710.046677] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 710.046691] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 710.046730] [ 710.079295] SELinux: security_context_str_to_sid () failed with errno=-22 [ 710.083604] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 710.091742] FAULT_INJECTION: forcing a failure. [ 710.091742] name failslab, interval 1, probability 0, space 0, times 0 [ 710.093399] CPU: 0 UID: 0 PID: 6408 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 710.093435] Tainted: [W]=WARN [ 710.093443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 710.093456] Call Trace: [ 710.093464] [ 710.093473] dump_stack_lvl+0xfa/0x120 [ 710.093513] should_fail_ex+0x4d7/0x5e0 [ 710.093544] should_failslab+0xc2/0x120 [ 710.093572] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 710.093599] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 710.093633] ? kmemdup_nul+0x3b/0xa0 [ 710.093674] kmemdup_nul+0x3b/0xa0 [ 710.093708] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 710.093743] security_sb_eat_lsm_opts+0x42/0x90 [ 710.093777] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 710.093812] vfs_parse_monolithic_sep+0x9c/0x200 [ 710.093847] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 710.093881] ? vfat_init_fs_context+0x55/0x70 [ 710.093903] ? alloc_fs_context+0x5c0/0x9e0 [ 710.093944] path_mount+0x12e5/0x1dd0 [ 710.093970] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 710.093995] ? __pfx_path_mount+0x10/0x10 [ 710.094020] ? kmem_cache_free+0x2a1/0x540 [ 710.094038] ? putname.part.0+0x11b/0x160 [ 710.094069] ? getname_flags.part.0+0x1c6/0x540 [ 710.094102] ? putname.part.0+0x11b/0x160 [ 710.094134] __x64_sys_mount+0x27b/0x300 [ 710.094159] ? __pfx___x64_sys_mount+0x10/0x10 [ 710.094193] do_syscall_64+0xbf/0x360 [ 710.094215] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.094238] RIP: 0033:0x7f4dc31f604a [ 710.094255] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.094278] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 710.094299] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 710.094314] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 710.094328] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 710.094342] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 710.094356] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 710.094384] [ 710.114811] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 22) 15:53:09 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 45) 15:53:09 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 18) 15:53:09 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 25) 15:53:09 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 44) [ 710.190244] FAULT_INJECTION: forcing a failure. [ 710.190244] name failslab, interval 1, probability 0, space 0, times 0 [ 710.191211] CPU: 0 UID: 0 PID: 6414 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 710.191232] Tainted: [W]=WARN [ 710.191235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 710.191243] Call Trace: [ 710.191248] [ 710.191252] dump_stack_lvl+0xfa/0x120 [ 710.191277] should_fail_ex+0x4d7/0x5e0 [ 710.191295] should_failslab+0xc2/0x120 [ 710.191311] __kmalloc_cache_noprof+0x73/0x690 [ 710.191329] ? trace_kmalloc+0x1f/0xb0 [ 710.191342] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 710.191358] ? selinux_add_opt+0x303/0x3f0 [ 710.191374] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 710.191391] ? selinux_add_opt+0x303/0x3f0 [ 710.191405] selinux_add_opt+0x303/0x3f0 [ 710.191420] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 710.191439] security_sb_eat_lsm_opts+0x42/0x90 [ 710.191458] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 710.191477] vfs_parse_monolithic_sep+0x9c/0x200 [ 710.191498] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 710.191516] ? vfat_init_fs_context+0x55/0x70 [ 710.191528] ? alloc_fs_context+0x5c0/0x9e0 [ 710.191550] path_mount+0x12e5/0x1dd0 [ 710.191565] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 710.191580] ? __pfx_path_mount+0x10/0x10 [ 710.191593] ? kmem_cache_free+0x2a1/0x540 [ 710.191603] ? putname.part.0+0x11b/0x160 [ 710.191620] ? getname_flags.part.0+0x1c6/0x540 [ 710.191638] ? putname.part.0+0x11b/0x160 [ 710.191656] __x64_sys_mount+0x27b/0x300 [ 710.191674] ? __pfx___x64_sys_mount+0x10/0x10 [ 710.191692] do_syscall_64+0xbf/0x360 [ 710.191705] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.191718] RIP: 0033:0x7fadd609d04a [ 710.191728] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.191740] RSP: 002b:00007fadd3610fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 710.191752] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd609d04a [ 710.191760] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 710.191767] RBP: 00007fadd3611040 R08: 00007fadd3611040 R09: 0000000020000080 [ 710.191775] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 710.191783] R13: 00000000200000c0 R14: 00007fadd3611000 R15: 0000000020000400 [ 710.191799] [ 710.226934] FAULT_INJECTION: forcing a failure. [ 710.226934] name failslab, interval 1, probability 0, space 0, times 0 [ 710.228745] CPU: 1 UID: 0 PID: 6416 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 710.228782] Tainted: [W]=WARN [ 710.228790] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 710.228803] Call Trace: [ 710.228810] [ 710.228818] dump_stack_lvl+0xfa/0x120 [ 710.228859] should_fail_ex+0x4d7/0x5e0 [ 710.228891] ? __es_insert_extent+0xed2/0x1370 [ 710.228923] should_failslab+0xc2/0x120 [ 710.228951] kmem_cache_alloc_noprof+0x72/0x690 [ 710.228984] ? __es_insert_extent+0xed2/0x1370 [ 710.229014] __es_insert_extent+0xed2/0x1370 [ 710.229049] ? __pfx_do_raw_write_lock+0x10/0x10 [ 710.229090] ext4_es_insert_extent+0x4d0/0x1100 [ 710.229134] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 710.229175] ? lock_acquire+0x15e/0x2f0 [ 710.229201] ? find_held_lock+0x2b/0x80 [ 710.229233] ? ext4_es_find_extent_range+0x1cf/0x510 [ 710.229267] ? lock_release+0xc8/0x290 [ 710.229293] ? do_raw_read_unlock+0x44/0xe0 [ 710.229330] ext4_ext_map_blocks+0x178d/0x5f70 [ 710.229374] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 710.229414] ? lock_acquire+0x15e/0x2f0 [ 710.229438] ? find_held_lock+0x2b/0x80 [ 710.229473] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 710.229502] ? mark_held_locks+0x49/0x80 [ 710.229530] ? finish_task_switch.isra.0+0x206/0x840 [ 710.229569] ? trace_sched_exit_tp+0xbf/0x100 [ 710.229605] ? __lock_acquire+0xc65/0x1b70 [ 710.229642] ? lock_acquire+0x15e/0x2f0 [ 710.229666] ? ext4_map_blocks+0x49f/0x14a0 [ 710.229700] ext4_map_query_blocks+0x117/0x890 [ 710.229735] ? __pfx_ext4_map_query_blocks+0x10/0x10 [ 710.229767] ? __pfx_down_read+0x10/0x10 [ 710.229788] ? ext4_es_lookup_extent+0xc8/0xb30 [ 710.229830] ext4_map_blocks+0x4b3/0x14a0 [ 710.229858] ? __pfx_ext4_map_blocks+0x10/0x10 [ 710.229879] ? __pfx_ext4_initxattrs+0x10/0x10 [ 710.229910] ? __pfx_security_inode_init_security+0x10/0x10 [ 710.229939] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 710.229976] ? crc32c+0x1ae/0x350 [ 710.229999] ? __brelse+0x7f/0xa0 [ 710.230039] ext4_append+0x1b6/0x530 [ 710.230066] ? __pfx_ext4_append+0x10/0x10 [ 710.230104] ext4_init_new_dir+0x13c/0x240 [ 710.230134] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 710.230174] ext4_mkdir+0x3c5/0xb30 [ 710.230210] ? __pfx_ext4_mkdir+0x10/0x10 [ 710.230238] ? security_inode_permission+0x72/0xe0 [ 710.230277] vfs_mkdir+0x59a/0x8d0 [ 710.230316] do_mkdirat+0x19f/0x3d0 [ 710.230342] ? __pfx_do_mkdirat+0x10/0x10 [ 710.230376] __x64_sys_mkdir+0xf3/0x140 [ 710.230401] do_syscall_64+0xbf/0x360 [ 710.230423] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.230446] RIP: 0033:0x7f6bdd3d3c27 [ 710.230463] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.230485] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 710.230506] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 710.230521] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 710.230534] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 710.230547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 710.230560] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 710.230591] [ 710.245781] FAULT_INJECTION: forcing a failure. [ 710.245781] name failslab, interval 1, probability 0, space 0, times 0 [ 710.263975] CPU: 0 UID: 0 PID: 6415 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 710.263997] Tainted: [W]=WARN [ 710.264001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 710.264009] Call Trace: [ 710.264014] [ 710.264019] dump_stack_lvl+0xfa/0x120 [ 710.264044] should_fail_ex+0x4d7/0x5e0 [ 710.264062] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 710.264076] should_failslab+0xc2/0x120 [ 710.264093] kmem_cache_alloc_noprof+0x72/0x690 [ 710.264111] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 710.264123] ext4_mb_new_blocks+0x2414/0x45b0 [ 710.264140] ? kasan_save_track+0x14/0x30 [ 710.264156] ? __kasan_kmalloc+0x7f/0x90 [ 710.264170] ? trace_kmalloc+0x1f/0xb0 [ 710.264184] ? __kmalloc_noprof+0x29d/0x6e0 [ 710.264202] ? ext4_find_extent+0x7f5/0xa00 [ 710.264218] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 710.264231] ? ext4_ext_search_right+0x2e8/0xbd0 [ 710.264246] ? ext4_inode_to_goal_block+0x323/0x430 [ 710.264263] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 710.264287] ? mark_held_locks+0x49/0x80 [ 710.264303] ? trace_sched_exit_tp+0xbf/0x100 [ 710.264325] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 710.264344] ? look_up_lock_class+0x56/0x150 [ 710.264365] ? lock_acquire+0x15e/0x2f0 [ 710.264378] ? ext4_map_blocks+0x55b/0x14a0 [ 710.264397] ? __pfx_down_write+0x10/0x10 [ 710.264408] ? ext4_es_lookup_extent+0xc8/0xb30 [ 710.264430] ext4_map_blocks+0x624/0x14a0 [ 710.264444] ? __up_read+0x197/0x750 [ 710.264459] ? __pfx_ext4_map_blocks+0x10/0x10 [ 710.264470] ? __pfx___up_read+0x10/0x10 [ 710.264487] ? lock_release+0xc8/0x290 [ 710.264503] ? ext4_map_blocks+0x1e0/0x14a0 [ 710.264519] ext4_getblk+0x682/0x8e0 [ 710.264531] ? __pfx_ext4_getblk+0x10/0x10 [ 710.264542] ? __pfx_security_inode_init_security+0x10/0x10 [ 710.264560] ? crc32c+0x1ae/0x350 [ 710.264576] ext4_bread+0x2e/0x1a0 [ 710.264588] ext4_append+0x224/0x530 [ 710.264603] ? __pfx_ext4_append+0x10/0x10 [ 710.264618] ? __pfx___ext4_new_inode+0x10/0x10 [ 710.264636] ext4_init_new_dir+0x13c/0x240 [ 710.264652] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 710.264678] ext4_mkdir+0x3c5/0xb30 [ 710.264698] ? __pfx_ext4_mkdir+0x10/0x10 [ 710.264714] ? security_inode_permission+0x72/0xe0 [ 710.264735] vfs_mkdir+0x59a/0x8d0 [ 710.264756] do_mkdirat+0x19f/0x3d0 [ 710.264770] ? __pfx_do_mkdirat+0x10/0x10 [ 710.264788] __x64_sys_mkdir+0xf3/0x140 [ 710.264801] do_syscall_64+0xbf/0x360 [ 710.264813] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 710.264827] RIP: 0033:0x7f6d651fcc27 [ 710.264836] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 710.264848] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 710.264860] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 710.264872] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 710.264879] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 710.264886] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 710.264894] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 710.264910] [ 710.270937] vfat: Bad value for 'defcontext' [ 710.344402] SELinux: security_context_str_to_sid () failed with errno=-22 [ 710.392766] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:53:19 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 46) 15:53:19 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 26) 15:53:19 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 23) 15:53:19 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 24) 15:53:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 19) 15:53:19 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 45) 15:53:19 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 42) 15:53:19 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 44) [ 720.282331] SELinux: security_context_str_to_sid () failed with errno=-22 [ 720.286196] SELinux: security_context_str_to_sid () failed with errno=-22 [ 720.292653] FAULT_INJECTION: forcing a failure. [ 720.292653] name failslab, interval 1, probability 0, space 0, times 0 [ 720.294428] CPU: 0 UID: 0 PID: 6436 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.294465] Tainted: [W]=WARN [ 720.294472] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.294486] Call Trace: [ 720.294493] [ 720.294502] dump_stack_lvl+0xfa/0x120 [ 720.294542] should_fail_ex+0x4d7/0x5e0 [ 720.294567] ? __es_remove_extent+0x53f/0x1570 [ 720.294604] ? __es_insert_extent+0xed2/0x1370 [ 720.294635] should_failslab+0xc2/0x120 [ 720.294662] kmem_cache_alloc_noprof+0x72/0x690 [ 720.294695] ? __pfx___es_remove_extent+0x10/0x10 [ 720.294734] ? __es_insert_extent+0xed2/0x1370 [ 720.294765] __es_insert_extent+0xed2/0x1370 [ 720.294823] ext4_es_insert_extent+0x4d0/0x1100 [ 720.294863] ? crc32c+0x1ae/0x350 [ 720.294887] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 720.294921] ? lock_acquire+0x15e/0x2f0 [ 720.294946] ? ext4_map_blocks+0x55b/0x14a0 [ 720.294981] ? __pfx_down_write+0x10/0x10 [ 720.295000] ? ext4_es_lookup_extent+0xc8/0xb30 [ 720.295042] ext4_map_blocks+0x7ff/0x14a0 [ 720.295070] ? __up_read+0x197/0x750 [ 720.295100] ? __pfx_ext4_map_blocks+0x10/0x10 [ 720.295121] ? __pfx___up_read+0x10/0x10 [ 720.295150] ? lock_release+0xc8/0x290 [ 720.295181] ? ext4_map_blocks+0x1e0/0x14a0 [ 720.295209] ext4_getblk+0x682/0x8e0 [ 720.295232] ? __pfx_ext4_getblk+0x10/0x10 [ 720.295251] ? __pfx_security_inode_init_security+0x10/0x10 [ 720.295283] ? crc32c+0x1ae/0x350 [ 720.295310] ext4_bread+0x2e/0x1a0 [ 720.295333] ext4_append+0x224/0x530 [ 720.295361] ? __pfx_ext4_append+0x10/0x10 [ 720.295388] ? __pfx___ext4_new_inode+0x10/0x10 [ 720.295422] ext4_init_new_dir+0x13c/0x240 [ 720.295452] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 720.295492] ext4_mkdir+0x3c5/0xb30 [ 720.295528] ? __pfx_ext4_mkdir+0x10/0x10 [ 720.295557] ? security_inode_permission+0x72/0xe0 [ 720.295596] vfs_mkdir+0x59a/0x8d0 [ 720.295635] do_mkdirat+0x19f/0x3d0 [ 720.295661] ? __pfx_do_mkdirat+0x10/0x10 [ 720.295694] __x64_sys_mkdir+0xf3/0x140 [ 720.295720] do_syscall_64+0xbf/0x360 [ 720.295742] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.295765] RIP: 0033:0x7f6d0c15cc27 [ 720.295782] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.295804] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 720.295826] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 720.295841] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 720.295854] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 720.295867] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 720.295881] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 720.295912] [ 720.302785] SELinux: security_context_str_to_sid () failed with errno=-22 [ 720.316965] SELinux: security_context_str_to_sid () failed with errno=-22 [ 720.317529] vfat: Bad value for 'defcontext' [ 720.322910] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 720.325878] FAULT_INJECTION: forcing a failure. [ 720.325878] name failslab, interval 1, probability 0, space 0, times 0 [ 720.329286] FAULT_INJECTION: forcing a failure. [ 720.329286] name failslab, interval 1, probability 0, space 0, times 0 [ 720.330219] CPU: 1 UID: 0 PID: 6440 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.330255] Tainted: [W]=WARN [ 720.330263] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.330276] Call Trace: [ 720.330284] [ 720.330293] dump_stack_lvl+0xfa/0x120 [ 720.330333] should_fail_ex+0x4d7/0x5e0 [ 720.330364] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 720.330387] should_failslab+0xc2/0x120 [ 720.330414] kmem_cache_alloc_noprof+0x72/0x690 [ 720.330447] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 720.330469] ext4_mb_new_blocks+0x2414/0x45b0 [ 720.330500] ? kasan_save_track+0x14/0x30 [ 720.330527] ? __kasan_kmalloc+0x7f/0x90 [ 720.330553] ? trace_kmalloc+0x1f/0xb0 [ 720.330577] ? __kmalloc_noprof+0x29d/0x6e0 [ 720.330610] ? ext4_find_extent+0x7f5/0xa00 [ 720.330639] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 720.330663] ? ext4_ext_search_right+0x2e8/0xbd0 [ 720.330699] ? ext4_inode_to_goal_block+0x323/0x430 [ 720.330729] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 720.330772] ? finish_task_switch.isra.0+0x206/0x840 [ 720.330831] ? trace_sched_exit_tp+0xbf/0x100 [ 720.330868] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 720.330904] ? look_up_lock_class+0x56/0x150 [ 720.330940] ? lock_acquire+0x15e/0x2f0 [ 720.330965] ? ext4_map_blocks+0x55b/0x14a0 [ 720.331000] ? __pfx_down_write+0x10/0x10 [ 720.331018] ? ext4_es_lookup_extent+0xc8/0xb30 [ 720.331060] ext4_map_blocks+0x624/0x14a0 [ 720.331086] ? __up_read+0x197/0x750 [ 720.331114] ? __pfx_ext4_map_blocks+0x10/0x10 [ 720.331135] ? __pfx___up_read+0x10/0x10 [ 720.331164] ? lock_release+0xc8/0x290 [ 720.331195] ? ext4_map_blocks+0x1e0/0x14a0 [ 720.331223] ext4_getblk+0x682/0x8e0 [ 720.331246] ? __pfx_ext4_getblk+0x10/0x10 [ 720.331265] ? __pfx_security_inode_init_security+0x10/0x10 [ 720.331299] ? crc32c+0x1ae/0x350 [ 720.331334] ext4_bread+0x2e/0x1a0 [ 720.331357] ext4_append+0x224/0x530 [ 720.331385] ? __pfx_ext4_append+0x10/0x10 [ 720.331412] ? __pfx___ext4_new_inode+0x10/0x10 [ 720.331445] ext4_init_new_dir+0x13c/0x240 [ 720.331475] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 720.331515] ext4_mkdir+0x3c5/0xb30 [ 720.331551] ? __pfx_ext4_mkdir+0x10/0x10 [ 720.331580] ? security_inode_permission+0x72/0xe0 [ 720.331618] vfs_mkdir+0x59a/0x8d0 [ 720.331656] do_mkdirat+0x19f/0x3d0 [ 720.331682] ? __pfx_do_mkdirat+0x10/0x10 [ 720.331715] __x64_sys_mkdir+0xf3/0x140 [ 720.331741] do_syscall_64+0xbf/0x360 [ 720.331762] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.331785] RIP: 0033:0x7f59eeb5ac27 [ 720.331802] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.331823] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 720.331845] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 720.331859] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 720.331872] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 720.331885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 720.331899] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 720.331929] [ 720.392452] CPU: 0 UID: 0 PID: 6442 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.392489] Tainted: [W]=WARN [ 720.392496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.392509] Call Trace: [ 720.392517] [ 720.392526] dump_stack_lvl+0xfa/0x120 [ 720.392560] should_fail_ex+0x4d7/0x5e0 [ 720.392589] should_failslab+0xc2/0x120 [ 720.392614] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 720.392640] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 720.392674] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 720.392702] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 720.392730] ? kmemdup_nul+0x3b/0xa0 [ 720.392763] kmemdup_nul+0x3b/0xa0 [ 720.392797] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 720.392831] security_sb_eat_lsm_opts+0x42/0x90 [ 720.392864] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 720.392898] vfs_parse_monolithic_sep+0x9c/0x200 [ 720.392934] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 720.392969] ? vfat_init_fs_context+0x55/0x70 [ 720.392990] ? alloc_fs_context+0x5c0/0x9e0 [ 720.393030] path_mount+0x12e5/0x1dd0 [ 720.393057] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 720.393081] ? __pfx_path_mount+0x10/0x10 [ 720.393105] ? kmem_cache_free+0x2a1/0x540 [ 720.393124] ? putname.part.0+0x11b/0x160 [ 720.393154] ? getname_flags.part.0+0x1c6/0x540 [ 720.393187] ? putname.part.0+0x11b/0x160 [ 720.393220] __x64_sys_mount+0x27b/0x300 [ 720.393245] ? __pfx___x64_sys_mount+0x10/0x10 [ 720.393279] do_syscall_64+0xbf/0x360 [ 720.393301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.393322] RIP: 0033:0x7f4dc31f604a [ 720.393339] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.393361] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.393383] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 720.393398] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 720.393411] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 720.393425] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 720.393438] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 720.393467] 15:53:20 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 25) 15:53:20 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 24) 15:53:20 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 43) 15:53:20 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 20) 15:53:20 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 45) 15:53:20 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 47) 15:53:20 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 27) [ 720.549208] SELinux: security_context_str_to_sid () failed with errno=-22 [ 720.569508] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:20 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 46) [ 720.599113] FAULT_INJECTION: forcing a failure. [ 720.599113] name failslab, interval 1, probability 0, space 0, times 0 [ 720.600970] CPU: 0 UID: 0 PID: 6450 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.601006] Tainted: [W]=WARN [ 720.601014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.601027] Call Trace: [ 720.601035] [ 720.601043] dump_stack_lvl+0xfa/0x120 [ 720.601085] should_fail_ex+0x4d7/0x5e0 [ 720.601116] should_failslab+0xc2/0x120 [ 720.601143] __kmalloc_noprof+0xc8/0x6e0 [ 720.601177] ? ext4_find_extent+0x7f5/0xa00 [ 720.601213] ? ext4_find_extent+0x7f5/0xa00 [ 720.601239] ext4_find_extent+0x7f5/0xa00 [ 720.601274] ext4_ext_map_blocks+0x1cc/0x5f70 [ 720.601315] ? lock_acquire+0x15e/0x2f0 [ 720.601341] ? fs_reclaim_acquire+0xae/0x150 [ 720.601367] ? lock_is_held_type+0x9e/0x120 [ 720.601406] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 720.601442] ? look_up_lock_class+0x56/0x150 [ 720.601477] ? lock_acquire+0x15e/0x2f0 [ 720.601501] ? ext4_map_blocks+0x55b/0x14a0 [ 720.601534] ? down_write+0x119/0x1f0 [ 720.601553] ? __pfx_down_write+0x10/0x10 [ 720.601571] ? ext4_es_lookup_extent+0xc8/0xb30 [ 720.601612] ext4_map_blocks+0x624/0x14a0 [ 720.601638] ? __up_read+0x197/0x750 [ 720.601673] ? __pfx_ext4_map_blocks+0x10/0x10 [ 720.601694] ? __pfx___up_read+0x10/0x10 [ 720.601723] ? lock_release+0xc8/0x290 [ 720.601754] ? ext4_map_blocks+0x1e0/0x14a0 [ 720.601782] ext4_getblk+0x682/0x8e0 [ 720.601805] ? __pfx_ext4_getblk+0x10/0x10 [ 720.601825] ? __pfx_security_inode_init_security+0x10/0x10 [ 720.601856] ? crc32c+0x1ae/0x350 [ 720.601884] ext4_bread+0x2e/0x1a0 [ 720.601907] ext4_append+0x224/0x530 [ 720.601935] ? __pfx_ext4_append+0x10/0x10 [ 720.601962] ? __pfx___ext4_new_inode+0x10/0x10 [ 720.601996] ext4_init_new_dir+0x13c/0x240 [ 720.602026] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 720.602066] ext4_mkdir+0x3c5/0xb30 [ 720.602102] ? __pfx_ext4_mkdir+0x10/0x10 [ 720.602130] ? security_inode_permission+0x72/0xe0 [ 720.602169] vfs_mkdir+0x59a/0x8d0 [ 720.602207] do_mkdirat+0x19f/0x3d0 [ 720.602234] ? __pfx_do_mkdirat+0x10/0x10 [ 720.602267] __x64_sys_mkdir+0xf3/0x140 [ 720.602292] do_syscall_64+0xbf/0x360 [ 720.602314] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.602336] RIP: 0033:0x7f6bdd3d3c27 [ 720.602353] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.602376] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 720.602397] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 720.602412] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 720.602425] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 720.602439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 720.602453] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 720.602483] [ 720.656583] FAULT_INJECTION: forcing a failure. [ 720.656583] name failslab, interval 1, probability 0, space 0, times 0 [ 720.658632] CPU: 1 UID: 0 PID: 6454 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.658678] Tainted: [W]=WARN [ 720.658685] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.658699] Call Trace: [ 720.658706] [ 720.658714] dump_stack_lvl+0xfa/0x120 [ 720.658755] should_fail_ex+0x4d7/0x5e0 [ 720.658784] should_failslab+0xc2/0x120 [ 720.658826] __kmalloc_cache_noprof+0x73/0x690 [ 720.658857] ? trace_kmalloc+0x1f/0xb0 [ 720.658882] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 720.658905] ? lock_release+0xc8/0x290 [ 720.658930] ? selinux_add_opt+0x303/0x3f0 [ 720.658955] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 720.658987] ? selinux_add_opt+0x303/0x3f0 [ 720.659012] selinux_add_opt+0x303/0x3f0 [ 720.659040] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 720.659074] security_sb_eat_lsm_opts+0x42/0x90 [ 720.659108] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 720.659141] vfs_parse_monolithic_sep+0x9c/0x200 [ 720.659177] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 720.659211] ? vfat_init_fs_context+0x55/0x70 [ 720.659233] ? alloc_fs_context+0x5c0/0x9e0 [ 720.659273] path_mount+0x12e5/0x1dd0 [ 720.659299] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 720.659324] ? __pfx_path_mount+0x10/0x10 [ 720.659348] ? kmem_cache_free+0x2a1/0x540 [ 720.659367] ? putname.part.0+0x11b/0x160 [ 720.659398] ? getname_flags.part.0+0x1c6/0x540 [ 720.659432] ? putname.part.0+0x11b/0x160 [ 720.659465] __x64_sys_mount+0x27b/0x300 [ 720.659490] ? __pfx___x64_sys_mount+0x10/0x10 [ 720.659523] do_syscall_64+0xbf/0x360 [ 720.659546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.659568] RIP: 0033:0x7f52aa14d04a [ 720.659586] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.659607] RSP: 002b:00007f52a76c0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.659629] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa14d04a [ 720.659644] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 720.659657] RBP: 00007f52a76c1040 R08: 00007f52a76c1040 R09: 0000000020000080 [ 720.659672] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 720.659685] R13: 00000000200000c0 R14: 00007f52a76c1000 R15: 0000000020000400 [ 720.659715] [ 720.704618] SELinux: security_context_str_to_sid () failed with errno=-22 [ 720.731208] FAULT_INJECTION: forcing a failure. [ 720.731208] name failslab, interval 1, probability 0, space 0, times 0 [ 720.733022] CPU: 1 UID: 0 PID: 6460 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.733057] Tainted: [W]=WARN [ 720.733064] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.733077] Call Trace: [ 720.733084] [ 720.733092] dump_stack_lvl+0xfa/0x120 [ 720.733132] should_fail_ex+0x4d7/0x5e0 [ 720.733162] should_failslab+0xc2/0x120 [ 720.733188] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 720.733214] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 720.733243] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 720.733271] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 720.733299] ? kmemdup_nul+0x3b/0xa0 [ 720.733332] kmemdup_nul+0x3b/0xa0 [ 720.733366] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 720.733400] security_sb_eat_lsm_opts+0x42/0x90 [ 720.733434] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 720.733467] vfs_parse_monolithic_sep+0x9c/0x200 [ 720.733503] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 720.733536] ? vfat_init_fs_context+0x55/0x70 [ 720.733558] ? alloc_fs_context+0x5c0/0x9e0 [ 720.733598] path_mount+0x12e5/0x1dd0 [ 720.733624] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 720.733649] ? __pfx_path_mount+0x10/0x10 [ 720.733681] ? kmem_cache_free+0x2a1/0x540 [ 720.733700] ? putname.part.0+0x11b/0x160 [ 720.733731] ? getname_flags.part.0+0x1c6/0x540 [ 720.733764] ? putname.part.0+0x11b/0x160 [ 720.733796] __x64_sys_mount+0x27b/0x300 [ 720.733821] ? __pfx___x64_sys_mount+0x10/0x10 [ 720.733855] do_syscall_64+0xbf/0x360 [ 720.733876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.733899] RIP: 0033:0x7f7957b2404a [ 720.733916] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.733938] RSP: 002b:00007f7955076fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 720.733960] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 720.733974] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 720.733988] RBP: 00007f7955077040 R08: 00007f7955077040 R09: 0000000020000080 [ 720.734002] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000080 [ 720.734016] R13: 00000000200000c0 R14: 00007f7955077000 R15: 0000000020000400 [ 720.734045] [ 720.741184] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 720.810235] FAULT_INJECTION: forcing a failure. [ 720.810235] name failslab, interval 1, probability 0, space 0, times 0 [ 720.811901] CPU: 0 UID: 0 PID: 6461 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 720.811937] Tainted: [W]=WARN [ 720.811944] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 720.811958] Call Trace: [ 720.811965] [ 720.811974] dump_stack_lvl+0xfa/0x120 [ 720.812015] should_fail_ex+0x4d7/0x5e0 [ 720.812046] should_failslab+0xc2/0x120 [ 720.812073] __kmalloc_cache_noprof+0x73/0x690 [ 720.812106] ? trace_kmalloc+0x1f/0xb0 [ 720.812131] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 720.812157] ? selinux_add_opt+0x303/0x3f0 [ 720.812183] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 720.812214] ? selinux_add_opt+0x303/0x3f0 [ 720.812240] selinux_add_opt+0x303/0x3f0 [ 720.812267] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 720.812301] security_sb_eat_lsm_opts+0x42/0x90 [ 720.812341] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 720.812374] vfs_parse_monolithic_sep+0x9c/0x200 [ 720.812411] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 720.812444] ? vfat_init_fs_context+0x55/0x70 [ 720.812466] ? alloc_fs_context+0x5c0/0x9e0 [ 720.812506] path_mount+0x12e5/0x1dd0 [ 720.812532] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 720.812558] ? __pfx_path_mount+0x10/0x10 [ 720.812582] ? kmem_cache_free+0x2a1/0x540 [ 720.812601] ? putname.part.0+0x11b/0x160 [ 720.812631] ? getname_flags.part.0+0x1c6/0x540 [ 720.812664] ? putname.part.0+0x11b/0x160 [ 720.812704] __x64_sys_mount+0x27b/0x300 [ 720.812728] ? __pfx___x64_sys_mount+0x10/0x10 [ 720.812762] do_syscall_64+0xbf/0x360 [ 720.812783] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 720.812806] RIP: 0033:0x7f4dc31f604a [ 720.812822] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 720.812844] RSP: 002b:00007f4dc0769fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 720.812866] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4dc31f604a [ 720.812881] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 720.812895] RBP: 00007f4dc076a040 R08: 00007f4dc076a040 R09: 0000000020000080 [ 720.812910] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 720.812924] R13: 00000000200000c0 R14: 00007f4dc076a000 R15: 0000000020000400 [ 720.812953] 15:53:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 46) 15:53:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 25) 15:53:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 47) 15:53:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 21) 15:53:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 48) 15:53:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 44) 15:53:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 28) 15:53:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 26) [ 729.636818] SELinux: security_context_str_to_sid () failed with errno=-22 [ 729.654496] SELinux: security_context_str_to_sid () failed with errno=-22 [ 729.658122] SELinux: security_context_str_to_sid () failed with errno=-22 [ 729.660499] FAULT_INJECTION: forcing a failure. [ 729.660499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 729.662593] CPU: 0 UID: 0 PID: 6475 Comm: syz-executor.0 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 729.662635] Tainted: [W]=WARN [ 729.662644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.662660] Call Trace: [ 729.662675] [ 729.662685] dump_stack_lvl+0xfa/0x120 [ 729.662731] should_fail_ex+0x4d7/0x5e0 [ 729.662767] _copy_from_user+0x30/0xd0 [ 729.662802] kstrtouint_from_user+0xbd/0x180 [ 729.662844] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 729.662896] ? __lock_acquire+0xc65/0x1b70 [ 729.662943] proc_fail_nth_write+0x7b/0x220 [ 729.662973] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 729.663004] ? lock_is_held_type+0x9e/0x120 [ 729.663046] vfs_write+0x2b7/0x1150 [ 729.663071] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 729.663105] ? __pfx_vfs_write+0x10/0x10 [ 729.663133] ? lock_release+0xc8/0x290 [ 729.663167] ? __fget_files+0x20d/0x3b0 [ 729.663204] ksys_write+0x121/0x240 [ 729.663230] ? __pfx_ksys_write+0x10/0x10 [ 729.663268] do_syscall_64+0xbf/0x360 [ 729.663294] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.663321] RIP: 0033:0x7fadd604e5ff [ 729.663340] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 729.663365] RSP: 002b:00007fadd3611170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 729.663391] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fadd604e5ff [ 729.663408] RDX: 0000000000000001 RSI: 00007fadd36111e0 RDI: 0000000000000004 [ 729.663424] RBP: 00007fadd36111d0 R08: 0000000000000000 R09: 0000000020000080 [ 729.663440] R10: 0000000001000001 R11: 0000000000000293 R12: 0000000000000002 [ 729.663457] R13: 00007ffd860fbfef R14: 00007fadd3611300 R15: 0000000000022000 [ 729.663492] [ 729.667220] FAULT_INJECTION: forcing a failure. [ 729.667220] name failslab, interval 1, probability 0, space 0, times 0 [ 729.699359] CPU: 1 UID: 0 PID: 6481 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 729.699401] Tainted: [W]=WARN [ 729.699408] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.699423] Call Trace: [ 729.699431] [ 729.699441] dump_stack_lvl+0xfa/0x120 [ 729.699482] should_fail_ex+0x4d7/0x5e0 [ 729.699510] ? __es_remove_extent+0x53f/0x1570 [ 729.699550] ? __es_insert_extent+0xed2/0x1370 [ 729.699585] should_failslab+0xc2/0x120 [ 729.699615] kmem_cache_alloc_noprof+0x72/0x690 [ 729.699644] ? __pfx___es_remove_extent+0x10/0x10 [ 729.699696] ? __es_insert_extent+0xed2/0x1370 [ 729.699731] __es_insert_extent+0xed2/0x1370 [ 729.699784] ext4_es_insert_extent+0x4d0/0x1100 [ 729.699829] ? crc32c+0x1ae/0x350 [ 729.699854] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 729.699893] ? lock_acquire+0x15e/0x2f0 [ 729.699921] ? ext4_map_blocks+0x55b/0x14a0 [ 729.699961] ? __pfx_down_write+0x10/0x10 [ 729.699983] ? ext4_es_lookup_extent+0xc8/0xb30 [ 729.700030] ext4_map_blocks+0x7ff/0x14a0 [ 729.700060] ? __up_read+0x197/0x750 [ 729.700091] ? __pfx_ext4_map_blocks+0x10/0x10 [ 729.700114] ? __pfx___up_read+0x10/0x10 [ 729.700148] ? lock_release+0xc8/0x290 [ 729.700182] ? ext4_map_blocks+0x1e0/0x14a0 [ 729.700215] ext4_getblk+0x682/0x8e0 [ 729.700241] ? __pfx_ext4_getblk+0x10/0x10 [ 729.700263] ? __pfx_security_inode_init_security+0x10/0x10 [ 729.700298] ? crc32c+0x1ae/0x350 [ 729.700329] ext4_bread+0x2e/0x1a0 [ 729.700355] ext4_append+0x224/0x530 [ 729.700386] ? __pfx_ext4_append+0x10/0x10 [ 729.700417] ? __pfx___ext4_new_inode+0x10/0x10 [ 729.700456] ext4_init_new_dir+0x13c/0x240 [ 729.700490] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 729.700535] ext4_mkdir+0x3c5/0xb30 [ 729.700576] ? __pfx_ext4_mkdir+0x10/0x10 [ 729.700609] ? security_inode_permission+0x72/0xe0 [ 729.700653] vfs_mkdir+0x59a/0x8d0 [ 729.700696] do_mkdirat+0x19f/0x3d0 [ 729.700725] ? __pfx_do_mkdirat+0x10/0x10 [ 729.700763] __x64_sys_mkdir+0xf3/0x140 [ 729.700791] do_syscall_64+0xbf/0x360 [ 729.700816] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.700840] RIP: 0033:0x7f59eeb5ac27 [ 729.700859] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.700883] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 15:53:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 26) [ 729.700907] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 729.700924] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 729.700939] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 729.700954] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 729.700969] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 729.701005] [ 729.707919] SELinux: security_context_str_to_sid () failed with errno=-22 [ 729.714267] SELinux: security_context_str_to_sid () failed with errno=-22 [ 729.718552] vfat: Bad value for 'defcontext' [ 729.719663] FAULT_INJECTION: forcing a failure. [ 729.719663] name failslab, interval 1, probability 0, space 0, times 0 [ 729.751743] CPU: 1 UID: 0 PID: 6483 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 729.751783] Tainted: [W]=WARN [ 729.751791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.751805] Call Trace: [ 729.751813] [ 729.751822] dump_stack_lvl+0xfa/0x120 [ 729.751861] should_fail_ex+0x4d7/0x5e0 [ 729.751892] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 729.751925] should_failslab+0xc2/0x120 [ 729.751952] kmem_cache_alloc_noprof+0x72/0x690 [ 729.751987] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 729.752018] jbd2_journal_add_journal_head+0x367/0x5d0 [ 729.752054] jbd2_journal_get_create_access+0x44/0x560 [ 729.752092] ? lock_is_held_type+0x9e/0x120 [ 729.752130] __ext4_journal_get_create_access+0x54/0x1b0 [ 729.752165] ext4_getblk+0x3c9/0x8e0 [ 729.752190] ? __pfx_ext4_getblk+0x10/0x10 [ 729.752211] ? __pfx_security_inode_init_security+0x10/0x10 [ 729.752245] ? crc32c+0x1ae/0x350 [ 729.752275] ext4_bread+0x2e/0x1a0 [ 729.752299] ext4_append+0x224/0x530 [ 729.752329] ? __pfx_ext4_append+0x10/0x10 [ 729.752358] ? __pfx___ext4_new_inode+0x10/0x10 [ 729.752395] ext4_init_new_dir+0x13c/0x240 [ 729.752427] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 729.752470] ext4_mkdir+0x3c5/0xb30 [ 729.752509] ? __pfx_ext4_mkdir+0x10/0x10 [ 729.752540] ? security_inode_permission+0x72/0xe0 [ 729.752582] vfs_mkdir+0x59a/0x8d0 [ 729.752622] do_mkdirat+0x19f/0x3d0 [ 729.752650] ? __pfx_do_mkdirat+0x10/0x10 [ 729.752694] __x64_sys_mkdir+0xf3/0x140 [ 729.752722] do_syscall_64+0xbf/0x360 [ 729.752745] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.752769] RIP: 0033:0x7f6d0c15cc27 [ 729.752787] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.752811] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 729.752834] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 729.752850] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 729.752865] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 15:53:29 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 45) [ 729.752880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 729.752895] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 729.752929] [ 729.792203] ENOMEM in journal_alloc_journal_head, retrying. [ 729.793327] SELinux: security_context_str_to_sid () failed with errno=-22 [ 729.796276] FAULT_INJECTION: forcing a failure. [ 729.796276] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 729.798442] CPU: 1 UID: 0 PID: 6482 Comm: syz-executor.6 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 729.798480] Tainted: [W]=WARN [ 729.798487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.798500] Call Trace: [ 729.798507] [ 729.798516] dump_stack_lvl+0xfa/0x120 [ 729.798553] should_fail_ex+0x4d7/0x5e0 [ 729.798584] _copy_to_user+0x32/0xd0 [ 729.798615] simple_read_from_buffer+0xe0/0x180 [ 729.798654] proc_fail_nth_read+0x18a/0x240 [ 729.798689] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 729.798715] ? security_file_permission+0x22/0x90 [ 729.798752] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 729.798777] vfs_read+0x1eb/0xc70 15:53:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 729.798807] ? __pfx_vfs_read+0x10/0x10 [ 729.798832] ? lock_release+0xc8/0x290 [ 729.798864] ? __fget_files+0x20d/0x3b0 [ 729.798916] ksys_read+0x121/0x240 [ 729.798949] ? __pfx_ksys_read+0x10/0x10 [ 729.798998] do_syscall_64+0xbf/0x360 [ 729.799021] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.799044] RIP: 0033:0x7f4dc31a769c [ 729.799062] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 729.799085] RSP: 002b:00007f4dc076a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 729.799107] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f4dc31a769c [ 729.799123] RDX: 000000000000000f RSI: 00007f4dc076a1e0 RDI: 0000000000000004 [ 729.799138] RBP: 00007f4dc076a1d0 R08: 0000000000000000 R09: 0000000020000080 [ 729.799152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 729.799167] R13: 00007ffc4cc1fcaf R14: 00007f4dc076a300 R15: 0000000000022000 [ 729.799199] [ 729.833304] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:53:29 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 22) 15:53:29 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:53:29 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 29) 15:53:29 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 27) [ 729.939137] FAULT_INJECTION: forcing a failure. [ 729.939137] name failslab, interval 1, probability 0, space 0, times 0 [ 729.941120] CPU: 0 UID: 0 PID: 6489 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 729.941159] Tainted: [W]=WARN [ 729.941167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.941181] Call Trace: [ 729.941189] [ 729.941198] dump_stack_lvl+0xfa/0x120 [ 729.941241] should_fail_ex+0x4d7/0x5e0 [ 729.941273] should_failslab+0xc2/0x120 [ 729.941302] __kmalloc_cache_noprof+0x73/0x690 [ 729.941336] ? trace_kmalloc+0x1f/0xb0 [ 729.941362] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 729.941389] ? selinux_add_opt+0x303/0x3f0 [ 729.941416] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 729.941449] ? selinux_add_opt+0x303/0x3f0 [ 729.941476] selinux_add_opt+0x303/0x3f0 [ 729.941506] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 729.941543] security_sb_eat_lsm_opts+0x42/0x90 [ 729.941579] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 729.941615] vfs_parse_monolithic_sep+0x9c/0x200 [ 729.941653] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 729.941697] ? vfat_init_fs_context+0x55/0x70 [ 729.941720] ? alloc_fs_context+0x5c0/0x9e0 [ 729.941762] path_mount+0x12e5/0x1dd0 [ 729.941799] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 729.941831] ? __pfx_path_mount+0x10/0x10 [ 729.941857] ? kmem_cache_free+0x2a1/0x540 [ 729.941877] ? putname.part.0+0x11b/0x160 [ 729.941909] ? getname_flags.part.0+0x1c6/0x540 [ 729.941945] ? putname.part.0+0x11b/0x160 [ 729.941979] __x64_sys_mount+0x27b/0x300 [ 729.942006] ? __pfx___x64_sys_mount+0x10/0x10 [ 729.942042] do_syscall_64+0xbf/0x360 [ 729.942065] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.942090] RIP: 0033:0x7f7957b2404a [ 729.942108] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.942131] RSP: 002b:00007f7955097fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 729.942154] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957b2404a [ 729.942169] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 729.942184] RBP: 00007f7955098040 R08: 00007f7955098040 R09: 0000000020000080 [ 729.942199] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 729.942213] R13: 00000000200000c0 R14: 00007f7955098000 R15: 0000000020000400 [ 729.942244] [ 729.963047] vfat: Bad value for 'defcontext' [ 729.964216] FAULT_INJECTION: forcing a failure. [ 729.964216] name failslab, interval 1, probability 0, space 0, times 0 [ 729.978710] CPU: 0 UID: 0 PID: 6488 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 729.978750] Tainted: [W]=WARN [ 729.978757] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 729.978771] Call Trace: [ 729.978780] [ 729.978789] dump_stack_lvl+0xfa/0x120 [ 729.978831] should_fail_ex+0x4d7/0x5e0 [ 729.978863] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 729.978907] should_failslab+0xc2/0x120 [ 729.978936] kmem_cache_alloc_noprof+0x72/0x690 [ 729.978971] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 729.979002] jbd2_journal_add_journal_head+0x367/0x5d0 [ 729.979037] jbd2_journal_get_create_access+0x44/0x560 [ 729.979075] ? lock_is_held_type+0x9e/0x120 [ 729.979113] __ext4_journal_get_create_access+0x54/0x1b0 [ 729.979148] ext4_getblk+0x3c9/0x8e0 [ 729.979173] ? __pfx_ext4_getblk+0x10/0x10 [ 729.979194] ? __pfx_security_inode_init_security+0x10/0x10 [ 729.979228] ? crc32c+0x1ae/0x350 [ 729.979258] ext4_bread+0x2e/0x1a0 [ 729.979282] ext4_append+0x224/0x530 [ 729.979312] ? __pfx_ext4_append+0x10/0x10 [ 729.979341] ? __pfx___ext4_new_inode+0x10/0x10 [ 729.979377] ext4_init_new_dir+0x13c/0x240 [ 729.979409] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 729.979452] ext4_mkdir+0x3c5/0xb30 [ 729.979490] ? __pfx_ext4_mkdir+0x10/0x10 [ 729.979522] ? security_inode_permission+0x72/0xe0 [ 729.979565] vfs_mkdir+0x59a/0x8d0 [ 729.979606] do_mkdirat+0x19f/0x3d0 [ 729.979635] ? __pfx_do_mkdirat+0x10/0x10 [ 729.979679] __x64_sys_mkdir+0xf3/0x140 [ 729.979706] do_syscall_64+0xbf/0x360 [ 729.979730] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 729.979755] RIP: 0033:0x7f6d651fcc27 [ 729.979774] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 729.979798] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 729.979821] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651fcc27 [ 729.979837] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 729.979851] RBP: 00007f6d62773040 R08: 0000000000000000 R09: 0000000001000001 [ 729.979866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 729.979879] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 729.979911] [ 730.015873] ENOMEM in journal_alloc_journal_head, retrying. [ 730.028978] SELinux: security_context_str_to_sid () failed with errno=-22 [ 730.039986] FAULT_INJECTION: forcing a failure. [ 730.039986] name failslab, interval 1, probability 0, space 0, times 0 [ 730.041950] CPU: 1 UID: 0 PID: 6495 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 730.041990] Tainted: [W]=WARN [ 730.041998] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 730.042014] Call Trace: [ 730.042022] [ 730.042031] dump_stack_lvl+0xfa/0x120 [ 730.042077] should_fail_ex+0x4d7/0x5e0 [ 730.042110] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 730.042144] should_failslab+0xc2/0x120 [ 730.042174] kmem_cache_alloc_noprof+0x72/0x690 [ 730.042211] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 730.042243] jbd2_journal_add_journal_head+0x367/0x5d0 [ 730.042280] jbd2_journal_get_create_access+0x44/0x560 [ 730.042319] ? lock_is_held_type+0x9e/0x120 [ 730.042359] __ext4_journal_get_create_access+0x54/0x1b0 [ 730.042395] ext4_getblk+0x3c9/0x8e0 [ 730.042421] ? __pfx_ext4_getblk+0x10/0x10 [ 730.042445] ? __pfx_security_inode_init_security+0x10/0x10 [ 730.042482] ? crc32c+0x1ae/0x350 [ 730.042513] ext4_bread+0x2e/0x1a0 [ 730.042538] ext4_append+0x224/0x530 [ 730.042569] ? __pfx_ext4_append+0x10/0x10 [ 730.042599] ? __pfx___ext4_new_inode+0x10/0x10 [ 730.042637] ext4_init_new_dir+0x13c/0x240 [ 730.042679] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 730.042724] ext4_mkdir+0x3c5/0xb30 [ 730.042763] ? __pfx_ext4_mkdir+0x10/0x10 [ 730.042795] ? security_inode_permission+0x72/0xe0 [ 730.042838] vfs_mkdir+0x59a/0x8d0 [ 730.042881] do_mkdirat+0x19f/0x3d0 [ 730.042936] ? __pfx_do_mkdirat+0x10/0x10 [ 730.042987] __x64_sys_mkdir+0xf3/0x140 [ 730.043027] do_syscall_64+0xbf/0x360 [ 730.043055] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 730.043080] RIP: 0033:0x7f6d0c15cc27 [ 730.043099] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 730.043124] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 730.043148] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15cc27 [ 730.043165] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 730.043180] RBP: 00007f6d096d3040 R08: 0000000000000000 R09: 0000000000000000 [ 730.043196] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 730.043211] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 730.043246] [ 730.077718] ENOMEM in journal_alloc_journal_head, retrying. [ 730.089593] SELinux: security_context_str_to_sid () failed with errno=-22 [ 730.120159] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:29 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:53:29 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 47) [ 730.157998] SELinux: security_context_str_to_sid () failed with errno=-22 [ 730.168315] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 730.175147] SELinux: security_context_str_to_sid () failed with errno=-22 [ 730.175265] SELinux: security_context_str_to_sid () failed with errno=-22 [ 730.214282] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 46) 15:53:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 27) 15:53:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:53:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 48) 15:53:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:53:39 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 28) 15:53:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 30) 15:53:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 23) [ 740.071370] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.078854] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.080534] vfat: Bad value for 'defcontext' [ 740.083948] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.087577] FAULT_INJECTION: forcing a failure. [ 740.087577] name failslab, interval 1, probability 0, space 0, times 0 [ 740.089237] CPU: 1 UID: 0 PID: 6524 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 740.089273] Tainted: [W]=WARN [ 740.089280] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.089293] Call Trace: [ 740.089301] [ 740.089310] dump_stack_lvl+0xfa/0x120 [ 740.089350] should_fail_ex+0x4d7/0x5e0 [ 740.089381] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 740.089411] should_failslab+0xc2/0x120 [ 740.089438] kmem_cache_alloc_noprof+0x72/0x690 [ 740.089470] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 740.089499] jbd2_journal_add_journal_head+0x367/0x5d0 [ 740.089531] jbd2_journal_get_create_access+0x44/0x560 [ 740.089567] ? lock_is_held_type+0x9e/0x120 [ 740.089602] __ext4_journal_get_create_access+0x54/0x1b0 [ 740.089635] ext4_getblk+0x3c9/0x8e0 [ 740.089659] ? __pfx_ext4_getblk+0x10/0x10 [ 740.089685] ? __pfx_security_inode_init_security+0x10/0x10 [ 740.089717] ? crc32c+0x1ae/0x350 [ 740.089744] ext4_bread+0x2e/0x1a0 [ 740.089767] ext4_append+0x224/0x530 [ 740.089795] ? __pfx_ext4_append+0x10/0x10 [ 740.089822] ? __pfx___ext4_new_inode+0x10/0x10 [ 740.089855] ext4_init_new_dir+0x13c/0x240 [ 740.089885] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 740.089925] ext4_mkdir+0x3c5/0xb30 [ 740.089961] ? __pfx_ext4_mkdir+0x10/0x10 [ 740.089989] ? security_inode_permission+0x72/0xe0 [ 740.090028] vfs_mkdir+0x59a/0x8d0 [ 740.090066] do_mkdirat+0x19f/0x3d0 [ 740.090092] ? __pfx_do_mkdirat+0x10/0x10 [ 740.090125] __x64_sys_mkdir+0xf3/0x140 [ 740.090150] do_syscall_64+0xbf/0x360 [ 740.090171] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 740.090195] RIP: 0033:0x7f59eeb5ac27 [ 740.090211] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.090233] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 740.090255] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5ac27 [ 740.090269] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 740.090283] RBP: 00007f59ec0d1040 R08: 0000000000000000 R09: 0000000000000000 [ 740.090296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 740.090310] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 740.090340] [ 740.124189] ENOMEM in journal_alloc_journal_head, retrying. [ 740.127872] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.129780] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.131976] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.136829] FAULT_INJECTION: forcing a failure. [ 740.136829] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 740.138519] CPU: 1 UID: 0 PID: 6526 Comm: syz-executor.1 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 740.138555] Tainted: [W]=WARN [ 740.138562] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.138575] Call Trace: [ 740.138582] [ 740.138591] dump_stack_lvl+0xfa/0x120 [ 740.138629] should_fail_ex+0x4d7/0x5e0 [ 740.138659] _copy_from_user+0x30/0xd0 [ 740.138695] kstrtouint_from_user+0xbd/0x180 [ 740.138729] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 740.138762] ? __lock_acquire+0xc65/0x1b70 [ 740.138803] proc_fail_nth_write+0x7b/0x220 [ 740.138828] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 740.138854] ? lock_is_held_type+0x9e/0x120 [ 740.138890] vfs_write+0x2b7/0x1150 [ 740.138911] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 740.138940] ? __pfx_vfs_write+0x10/0x10 [ 740.138964] ? lock_release+0xc8/0x290 [ 740.139004] ? __fget_files+0x20d/0x3b0 [ 740.139036] ksys_write+0x121/0x240 [ 740.139059] ? __pfx_ksys_write+0x10/0x10 [ 740.139091] do_syscall_64+0xbf/0x360 [ 740.139113] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 740.139135] RIP: 0033:0x7f52aa0fe5ff [ 740.139152] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 740.139174] RSP: 002b:00007f52a76c1170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 740.139195] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f52aa0fe5ff [ 740.139209] RDX: 0000000000000001 RSI: 00007f52a76c11e0 RDI: 0000000000000003 [ 740.139222] RBP: 00007f52a76c11d0 R08: 0000000000000000 R09: 0000000020000080 [ 740.139236] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 740.139249] R13: 00007ffc5f199e2f R14: 00007f52a76c1300 R15: 0000000000022000 [ 740.139280] 15:53:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 28) 15:53:39 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:53:39 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 47) 15:53:39 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 31) 15:53:39 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 740.217029] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:39 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 24) [ 740.258555] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.265038] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.314794] SELinux: security_context_str_to_sid () failed with errno=-22 [ 740.320529] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:39 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 740.359218] FAULT_INJECTION: forcing a failure. [ 740.359218] name failslab, interval 1, probability 0, space 0, times 0 [ 740.361151] CPU: 0 UID: 0 PID: 6538 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 740.361188] Tainted: [W]=WARN [ 740.361195] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 740.361208] Call Trace: [ 740.361215] [ 740.361224] dump_stack_lvl+0xfa/0x120 [ 740.361265] should_fail_ex+0x4d7/0x5e0 [ 740.361295] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 740.361318] should_failslab+0xc2/0x120 [ 740.361346] kmem_cache_alloc_noprof+0x72/0x690 [ 740.361378] ? ext4_mb_new_blocks+0x2414/0x45b0 [ 740.361399] ext4_mb_new_blocks+0x2414/0x45b0 [ 740.361430] ? kasan_save_track+0x14/0x30 [ 740.361457] ? __kasan_kmalloc+0x7f/0x90 [ 740.361484] ? trace_kmalloc+0x1f/0xb0 [ 740.361508] ? __kmalloc_noprof+0x29d/0x6e0 [ 740.361541] ? ext4_find_extent+0x7f5/0xa00 [ 740.361569] ? __pfx_ext4_mb_new_blocks+0x10/0x10 [ 740.361594] ? ext4_ext_search_right+0x2e8/0xbd0 [ 740.361621] ? ext4_inode_to_goal_block+0x323/0x430 [ 740.361651] ext4_ext_map_blocks+0x1c4b/0x5f70 [ 740.361700] ? lock_acquire+0x15e/0x2f0 [ 740.361726] ? fs_reclaim_acquire+0xae/0x150 [ 740.361752] ? lock_is_held_type+0x9e/0x120 [ 740.361791] ? __pfx_ext4_ext_map_blocks+0x10/0x10 [ 740.361828] ? crc32c+0x1ae/0x350 [ 740.361853] ? lock_acquire+0x15e/0x2f0 [ 740.361877] ? ext4_map_blocks+0x55b/0x14a0 [ 740.361915] ? __pfx_down_write+0x10/0x10 [ 740.361935] ? ext4_es_lookup_extent+0xc8/0xb30 [ 740.361977] ext4_map_blocks+0x624/0x14a0 [ 740.362003] ? __up_read+0x197/0x750 [ 740.362031] ? __pfx_ext4_map_blocks+0x10/0x10 [ 740.362052] ? __pfx___up_read+0x10/0x10 [ 740.362081] ? lock_release+0xc8/0x290 [ 740.362112] ? ext4_map_blocks+0x1e0/0x14a0 [ 740.362140] ext4_getblk+0x682/0x8e0 [ 740.362162] ? __pfx_ext4_getblk+0x10/0x10 [ 740.362181] ? __pfx_security_inode_init_security+0x10/0x10 [ 740.362212] ? crc32c+0x1ae/0x350 [ 740.362239] ext4_bread+0x2e/0x1a0 [ 740.362261] ext4_append+0x224/0x530 [ 740.362289] ? __pfx_ext4_append+0x10/0x10 [ 740.362315] ? __pfx___ext4_new_inode+0x10/0x10 [ 740.362349] ext4_init_new_dir+0x13c/0x240 [ 740.362379] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 740.362419] ext4_mkdir+0x3c5/0xb30 [ 740.362454] ? __pfx_ext4_mkdir+0x10/0x10 [ 740.362483] ? security_inode_permission+0x72/0xe0 [ 740.362522] vfs_mkdir+0x59a/0x8d0 [ 740.362560] do_mkdirat+0x19f/0x3d0 [ 740.362586] ? __pfx_do_mkdirat+0x10/0x10 [ 740.362619] __x64_sys_mkdir+0xf3/0x140 [ 740.362645] do_syscall_64+0xbf/0x360 [ 740.362667] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 740.362689] RIP: 0033:0x7f6bdd3d3c27 [ 740.362706] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 740.362728] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 740.362749] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 740.362764] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 740.362777] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 740.362790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 740.362804] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 740.362835] [ 740.462546] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 25) 15:53:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 29) 15:53:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 29) 15:53:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:53:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) (fail_nth: 48) 15:53:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:53:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 32) 15:53:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 750.754890] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.756035] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.759247] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 30) [ 750.785459] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.791565] FAULT_INJECTION: forcing a failure. [ 750.791565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 750.792634] CPU: 0 UID: 0 PID: 6555 Comm: syz-executor.3 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 750.792654] Tainted: [W]=WARN [ 750.792658] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 750.792669] Call Trace: [ 750.792673] [ 750.792678] dump_stack_lvl+0xfa/0x120 [ 750.792707] should_fail_ex+0x4d7/0x5e0 [ 750.792726] _copy_from_user+0x30/0xd0 [ 750.792743] kstrtouint_from_user+0xbd/0x180 [ 750.792762] ? __pfx_kstrtouint_from_user+0x10/0x10 [ 750.792781] ? __lock_acquire+0xc65/0x1b70 [ 750.792804] proc_fail_nth_write+0x7b/0x220 [ 750.792819] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 750.792833] ? lock_is_held_type+0x9e/0x120 [ 750.792854] vfs_write+0x2b7/0x1150 [ 750.792866] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 750.792882] ? __pfx_vfs_write+0x10/0x10 [ 750.792895] ? lock_release+0xc8/0x290 [ 750.792911] ? __fget_files+0x20d/0x3b0 [ 750.792929] ksys_write+0x121/0x240 [ 750.792941] ? __pfx_ksys_write+0x10/0x10 [ 750.792959] do_syscall_64+0xbf/0x360 [ 750.792972] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 750.792985] RIP: 0033:0x7f7957ad55ff [ 750.792995] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 750.793007] RSP: 002b:00007f7955098170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 750.793020] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7957ad55ff [ 750.793029] RDX: 0000000000000001 RSI: 00007f79550981e0 RDI: 0000000000000004 [ 750.793036] RBP: 00007f79550981d0 R08: 0000000000000000 R09: 0000000020000080 [ 750.793044] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 750.793052] R13: 00007ffdb49028af R14: 00007f7955098300 R15: 0000000000022000 [ 750.793069] [ 750.797634] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.807417] vfat: Bad value for 'defcontext' [ 750.818714] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.819295] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.828221] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.829307] SELinux: security_context_str_to_sid () failed with errno=-22 [ 750.830586] FAULT_INJECTION: forcing a failure. [ 750.830586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 750.832552] CPU: 1 UID: 0 PID: 6564 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 750.832590] Tainted: [W]=WARN [ 750.832598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 750.832612] Call Trace: [ 750.832619] [ 750.832628] dump_stack_lvl+0xfa/0x120 [ 750.832677] should_fail_ex+0x4d7/0x5e0 [ 750.832708] _copy_from_user+0x30/0xd0 [ 750.832738] memdup_user+0x7e/0xe0 [ 750.832761] strndup_user+0x78/0xe0 [ 750.832784] __x64_sys_mount+0x136/0x300 [ 750.832812] ? __pfx___x64_sys_mount+0x10/0x10 [ 750.832849] do_syscall_64+0xbf/0x360 [ 750.832871] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 750.832895] RIP: 0033:0x7f6d0c15f04a [ 750.832912] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 750.832935] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 750.832959] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 750.832975] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 750.832991] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 750.833006] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 750.833021] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 750.833052] 15:53:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:53:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 750.906170] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 26) 15:53:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 31) 15:53:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 750.914015] SELinux: security_context_str_to_sid () failed with errno=-22 15:53:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 30) 15:53:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 750.958792] FAULT_INJECTION: forcing a failure. [ 750.958792] name failslab, interval 1, probability 0, space 0, times 0 [ 750.959734] CPU: 0 UID: 0 PID: 6573 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 750.959755] Tainted: [W]=WARN [ 750.959759] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 750.959767] Call Trace: [ 750.959772] [ 750.959777] dump_stack_lvl+0xfa/0x120 [ 750.959809] should_fail_ex+0x4d7/0x5e0 [ 750.959825] ? __es_remove_extent+0x53f/0x1570 [ 750.959847] ? __es_insert_extent+0xed2/0x1370 [ 750.959863] should_failslab+0xc2/0x120 [ 750.959881] kmem_cache_alloc_noprof+0x72/0x690 [ 750.959896] ? __pfx___es_remove_extent+0x10/0x10 [ 750.959916] ? __es_insert_extent+0xed2/0x1370 [ 750.959933] __es_insert_extent+0xed2/0x1370 [ 750.959958] ext4_es_insert_extent+0x4d0/0x1100 [ 750.959980] ? look_up_lock_class+0x56/0x150 [ 750.960000] ? __pfx_ext4_es_insert_extent+0x10/0x10 [ 750.960018] ? lock_acquire+0x15e/0x2f0 [ 750.960034] ? ext4_map_blocks+0x55b/0x14a0 [ 750.960055] ? __pfx_down_write+0x10/0x10 [ 750.960065] ? ext4_es_lookup_extent+0xc8/0xb30 [ 750.960088] ext4_map_blocks+0x7ff/0x14a0 [ 750.960103] ? __up_read+0x197/0x750 [ 750.960120] ? __pfx_ext4_map_blocks+0x10/0x10 [ 750.960131] ? __pfx___up_read+0x10/0x10 [ 750.960147] ? lock_release+0xc8/0x290 [ 750.960163] ? ext4_map_blocks+0x1e0/0x14a0 [ 750.960178] ext4_getblk+0x682/0x8e0 [ 750.960191] ? __pfx_ext4_getblk+0x10/0x10 [ 750.960201] ? __pfx_security_inode_init_security+0x10/0x10 [ 750.960220] ? crc32c+0x1ae/0x350 [ 750.960236] ext4_bread+0x2e/0x1a0 [ 750.960248] ext4_append+0x224/0x530 [ 750.960264] ? __pfx_ext4_append+0x10/0x10 [ 750.960279] ? __pfx___ext4_new_inode+0x10/0x10 [ 750.960297] ext4_init_new_dir+0x13c/0x240 [ 750.960315] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 750.960336] ext4_mkdir+0x3c5/0xb30 [ 750.960355] ? __pfx_ext4_mkdir+0x10/0x10 [ 750.960371] ? security_inode_permission+0x72/0xe0 [ 750.960393] vfs_mkdir+0x59a/0x8d0 [ 750.960414] do_mkdirat+0x19f/0x3d0 [ 750.960429] ? __pfx_do_mkdirat+0x10/0x10 [ 750.960447] __x64_sys_mkdir+0xf3/0x140 [ 750.960460] do_syscall_64+0xbf/0x360 [ 750.960473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 750.960486] RIP: 0033:0x7f6bdd3d3c27 [ 750.960496] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 750.960509] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 750.960520] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 750.960529] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 750.960537] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 750.960544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 750.960552] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 750.960569] [ 750.985002] vfat: Bad value for 'defcontext' [ 751.025051] SELinux: security_context_str_to_sid () failed with errno=-22 [ 751.031502] SELinux: security_context_str_to_sid () failed with errno=-22 [ 751.037835] SELinux: security_context_str_to_sid () failed with errno=-22 [ 751.043351] SELinux: security_context_str_to_sid () failed with errno=-22 [ 751.047597] SELinux: security_context_str_to_sid () failed with errno=-22 [ 751.068448] FAULT_INJECTION: forcing a failure. [ 751.068448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 751.069404] CPU: 0 UID: 0 PID: 6582 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 751.069424] Tainted: [W]=WARN [ 751.069429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 751.069437] Call Trace: [ 751.069441] [ 751.069446] dump_stack_lvl+0xfa/0x120 [ 751.069474] should_fail_ex+0x4d7/0x5e0 [ 751.069493] _copy_from_user+0x30/0xd0 [ 751.069510] memdup_user+0x7e/0xe0 [ 751.069523] strndup_user+0x78/0xe0 [ 751.069535] __x64_sys_mount+0x136/0x300 [ 751.069550] ? __pfx___x64_sys_mount+0x10/0x10 [ 751.069569] do_syscall_64+0xbf/0x360 [ 751.069581] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 751.069595] RIP: 0033:0x7f6d651ff04a [ 751.069605] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 751.069617] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 751.069629] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 751.069638] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 751.069645] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 751.069653] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 751.069661] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 751.069681] 15:54:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 32) 15:54:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 33) 15:54:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 27) 15:54:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:06 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 31) [ 766.991901] vfat: Bad value for 'defcontext' [ 766.996508] FAULT_INJECTION: forcing a failure. [ 766.996508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 766.997884] CPU: 0 UID: 0 PID: 6597 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 766.997911] Tainted: [W]=WARN [ 766.997916] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 766.997926] Call Trace: [ 766.997931] [ 766.997937] dump_stack_lvl+0xfa/0x120 [ 766.997968] should_fail_ex+0x4d7/0x5e0 [ 766.997990] _copy_from_user+0x30/0xd0 [ 766.998011] memdup_user+0x7e/0xe0 [ 766.998027] strndup_user+0x78/0xe0 [ 766.998042] __x64_sys_mount+0x136/0x300 [ 766.998062] ? __pfx___x64_sys_mount+0x10/0x10 [ 766.998086] do_syscall_64+0xbf/0x360 [ 766.998102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 766.998119] RIP: 0033:0x7f59eeb5d04a [ 766.998131] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 766.998148] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 766.998163] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 766.998174] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 766.998184] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 766.998194] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 766.998204] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 766.998225] [ 767.000832] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.001863] FAULT_INJECTION: forcing a failure. [ 767.001863] name failslab, interval 1, probability 0, space 0, times 0 [ 767.007494] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.008560] CPU: 0 UID: 0 PID: 6595 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 767.008587] Tainted: [W]=WARN [ 767.008592] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 767.008601] Call Trace: [ 767.008607] [ 767.008613] dump_stack_lvl+0xfa/0x120 [ 767.008638] should_fail_ex+0x4d7/0x5e0 [ 767.008658] should_failslab+0xc2/0x120 [ 767.008684] __kmalloc_cache_noprof+0x73/0x690 [ 767.008707] ? __might_fault+0xe0/0x190 [ 767.008727] ? copy_mount_options+0x55/0x180 [ 767.008752] ? copy_mount_options+0x55/0x180 [ 767.008771] ? memdup_user+0x95/0xe0 [ 767.008784] copy_mount_options+0x55/0x180 [ 767.008807] __x64_sys_mount+0x1ab/0x300 [ 767.008826] ? __pfx___x64_sys_mount+0x10/0x10 [ 767.008850] do_syscall_64+0xbf/0x360 [ 767.008866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 767.008881] RIP: 0033:0x7f6d0c15f04a [ 767.008893] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.008909] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.008924] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 767.008934] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 767.008944] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 767.008954] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 767.008964] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 767.008984] [ 767.010416] FAULT_INJECTION: forcing a failure. [ 767.010416] name failslab, interval 1, probability 0, space 0, times 0 [ 767.013604] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.014367] CPU: 0 UID: 0 PID: 6598 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 767.014393] Tainted: [W]=WARN [ 767.014398] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 767.014407] Call Trace: [ 767.014411] [ 767.014417] dump_stack_lvl+0xfa/0x120 [ 767.014440] should_fail_ex+0x4d7/0x5e0 [ 767.014460] should_failslab+0xc2/0x120 [ 767.014477] __kmalloc_cache_noprof+0x73/0x690 [ 767.014498] ? __might_fault+0xe0/0x190 [ 767.014516] ? copy_mount_options+0x55/0x180 [ 767.014539] ? copy_mount_options+0x55/0x180 [ 767.014557] ? memdup_user+0x95/0xe0 [ 767.014569] copy_mount_options+0x55/0x180 [ 767.014590] __x64_sys_mount+0x1ab/0x300 [ 767.014607] ? __pfx___x64_sys_mount+0x10/0x10 [ 767.014631] do_syscall_64+0xbf/0x360 [ 767.014645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 767.014660] RIP: 0033:0x7f6d651ff04a [ 767.014677] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.014692] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.014706] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 767.014716] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 767.014726] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 767.014735] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 767.014745] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 767.014765] [ 767.079258] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.082221] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.088026] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 28) 15:54:06 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 33) [ 767.121266] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:06 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:06 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 34) 15:54:06 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 32) [ 767.184996] FAULT_INJECTION: forcing a failure. [ 767.184996] name failslab, interval 1, probability 0, space 0, times 0 [ 767.186414] CPU: 0 UID: 0 PID: 6609 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 767.186441] Tainted: [W]=WARN [ 767.186446] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 767.186456] Call Trace: [ 767.186462] [ 767.186468] dump_stack_lvl+0xfa/0x120 [ 767.186499] should_fail_ex+0x4d7/0x5e0 [ 767.186522] should_failslab+0xc2/0x120 [ 767.186542] __kmalloc_cache_noprof+0x73/0x690 [ 767.186566] ? __might_fault+0xe0/0x190 [ 767.186585] ? copy_mount_options+0x55/0x180 [ 767.186611] ? copy_mount_options+0x55/0x180 [ 767.186629] ? memdup_user+0x95/0xe0 [ 767.186644] copy_mount_options+0x55/0x180 [ 767.186672] __x64_sys_mount+0x1ab/0x300 [ 767.186691] ? __pfx___x64_sys_mount+0x10/0x10 [ 767.186720] do_syscall_64+0xbf/0x360 [ 767.186736] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 767.186753] RIP: 0033:0x7f59eeb5d04a [ 767.186766] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.186781] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.186797] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 767.186808] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 767.186818] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 15:54:06 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 767.186828] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 767.186838] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 767.186859] [ 767.191903] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.203210] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 767.212328] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.223880] FAULT_INJECTION: forcing a failure. [ 767.223880] name failslab, interval 1, probability 0, space 0, times 0 [ 767.225978] CPU: 1 UID: 0 PID: 6613 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 767.226019] Tainted: [W]=WARN [ 767.226027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 767.226042] Call Trace: [ 767.226051] [ 767.226061] dump_stack_lvl+0xfa/0x120 [ 767.226106] should_fail_ex+0x4d7/0x5e0 [ 767.226142] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 767.226176] should_failslab+0xc2/0x120 [ 767.226205] kmem_cache_alloc_noprof+0x72/0x690 [ 767.226242] ? jbd2_journal_add_journal_head+0x367/0x5d0 [ 767.226274] jbd2_journal_add_journal_head+0x367/0x5d0 [ 767.226309] jbd2_journal_get_create_access+0x44/0x560 [ 767.226348] ? lock_is_held_type+0x9e/0x120 [ 767.226387] __ext4_journal_get_create_access+0x54/0x1b0 [ 767.226423] ext4_getblk+0x3c9/0x8e0 [ 767.226449] ? __pfx_ext4_getblk+0x10/0x10 [ 767.226471] ? __pfx_security_inode_init_security+0x10/0x10 [ 767.226506] ? crc32c+0x1ae/0x350 [ 767.226536] ext4_bread+0x2e/0x1a0 [ 767.226561] ext4_append+0x224/0x530 [ 767.226593] ? __pfx_ext4_append+0x10/0x10 [ 767.226622] ? __pfx___ext4_new_inode+0x10/0x10 [ 767.226661] ext4_init_new_dir+0x13c/0x240 [ 767.226703] ? __pfx_ext4_init_new_dir+0x10/0x10 [ 767.226747] ext4_mkdir+0x3c5/0xb30 [ 767.226786] ? __pfx_ext4_mkdir+0x10/0x10 [ 767.226818] ? security_inode_permission+0x72/0xe0 [ 767.226861] vfs_mkdir+0x59a/0x8d0 [ 767.226902] do_mkdirat+0x19f/0x3d0 [ 767.226931] ? __pfx_do_mkdirat+0x10/0x10 [ 767.226968] __x64_sys_mkdir+0xf3/0x140 [ 767.226996] do_syscall_64+0xbf/0x360 [ 767.227020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 767.227045] RIP: 0033:0x7f6bdd3d3c27 [ 767.227064] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.227089] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 767.227112] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d3c27 [ 767.227129] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 00000000200000c0 [ 767.227145] RBP: 00007f6bda94a040 R08: 0000000000000000 R09: 0000000000000000 [ 767.227160] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000080 [ 767.227176] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 767.227210] [ 767.265987] ENOMEM in journal_alloc_journal_head, retrying. 15:54:06 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 33) 15:54:06 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 767.286400] vfat: Bad value for 'defcontext' 15:54:06 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 767.316341] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.338086] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.339586] FAULT_INJECTION: forcing a failure. [ 767.339586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 767.340915] CPU: 0 UID: 0 PID: 6617 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 767.340941] Tainted: [W]=WARN [ 767.340946] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 767.340956] Call Trace: [ 767.340963] [ 767.340970] dump_stack_lvl+0xfa/0x120 [ 767.341000] should_fail_ex+0x4d7/0x5e0 [ 767.341023] _copy_from_user+0x30/0xd0 [ 767.341045] copy_mount_options+0x76/0x180 [ 767.341068] __x64_sys_mount+0x1ab/0x300 [ 767.341088] ? __pfx___x64_sys_mount+0x10/0x10 [ 767.341112] do_syscall_64+0xbf/0x360 [ 767.341129] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 767.341146] RIP: 0033:0x7f6d651ff04a [ 767.341159] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 767.341175] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 767.341191] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 767.341201] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 767.341212] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 767.341222] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 767.341233] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 767.341253] [ 767.377181] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.409020] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.422426] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.428177] SELinux: security_context_str_to_sid () failed with errno=-22 [ 767.428619] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:16 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 34) 15:54:16 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:16 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 29) 15:54:16 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 34) 15:54:16 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 35) [ 776.961645] SELinux: security_context_str_to_sid () failed with errno=-22 [ 776.970552] SELinux: security_context_str_to_sid () failed with errno=-22 [ 776.973104] vfat: Bad value for 'defcontext' [ 776.978370] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:16 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 30) [ 777.001107] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:16 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 777.007620] SELinux: security_context_str_to_sid () failed with errno=-22 [ 777.011993] SELinux: security_context_str_to_sid () failed with errno=-22 [ 777.019275] SELinux: security_context_str_to_sid () failed with errno=-22 [ 777.024397] FAULT_INJECTION: forcing a failure. [ 777.024397] name failslab, interval 1, probability 0, space 0, times 0 [ 777.025343] SELinux: security_context_str_to_sid () failed with errno=-22 [ 777.025502] CPU: 1 UID: 0 PID: 6645 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 777.025524] Tainted: [W]=WARN 15:54:16 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x25, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 777.025528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.025538] Call Trace: [ 777.025544] [ 777.025549] dump_stack_lvl+0xfa/0x120 [ 777.025578] should_fail_ex+0x4d7/0x5e0 [ 777.025597] ? getname_flags.part.0+0x48/0x540 [ 777.025615] should_failslab+0xc2/0x120 [ 777.025632] kmem_cache_alloc_noprof+0x72/0x690 [ 777.025653] ? getname_flags.part.0+0x48/0x540 [ 777.025676] getname_flags.part.0+0x48/0x540 [ 777.025694] getname_flags+0x95/0xe0 [ 777.025707] user_path_at+0x27/0x90 [ 777.025722] __x64_sys_mount+0x1e9/0x300 [ 777.025743] ? __pfx___x64_sys_mount+0x10/0x10 [ 777.025762] do_syscall_64+0xbf/0x360 [ 777.025775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 777.025789] RIP: 0033:0x7f6d651ff04a [ 777.025799] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.025814] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 777.025829] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 777.025840] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 777.025850] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 777.025859] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 777.025867] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 777.025884] [ 777.052882] FAULT_INJECTION: forcing a failure. [ 777.052882] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 777.054874] CPU: 0 UID: 0 PID: 6646 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 777.054911] Tainted: [W]=WARN [ 777.054919] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 777.054933] Call Trace: [ 777.054940] [ 777.054949] dump_stack_lvl+0xfa/0x120 [ 777.054992] should_fail_ex+0x4d7/0x5e0 [ 777.055023] _copy_from_user+0x30/0xd0 [ 777.055053] copy_mount_options+0x76/0x180 [ 777.055089] __x64_sys_mount+0x1ab/0x300 [ 777.055116] ? __pfx___x64_sys_mount+0x10/0x10 [ 777.055151] do_syscall_64+0xbf/0x360 [ 777.055173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 777.055197] RIP: 0033:0x7f6d0c15f04a [ 777.055214] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 777.055237] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 777.055259] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 777.055274] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 777.055289] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 777.055303] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 777.055317] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 777.055359] [ 777.077175] SELinux: security_context_str_to_sid () failed with errno=-22 [ 777.102468] SELinux: security_context_str_to_sid () failed with errno=-22 [ 777.142057] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:54:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 36) 15:54:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 31) 15:54:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 35) 15:54:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:25 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 35) 15:54:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 785.617785] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.619435] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.623026] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.635166] vfat: Bad value for 'defcontext' 15:54:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 785.650288] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.656380] FAULT_INJECTION: forcing a failure. [ 785.656380] name failslab, interval 1, probability 0, space 0, times 0 [ 785.658718] CPU: 1 UID: 0 PID: 6667 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.658763] Tainted: [W]=WARN [ 785.658772] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.658788] Call Trace: [ 785.658798] [ 785.658809] dump_stack_lvl+0xfa/0x120 [ 785.658856] should_fail_ex+0x4d7/0x5e0 [ 785.658891] ? getname_flags.part.0+0x48/0x540 [ 785.658928] should_failslab+0xc2/0x120 [ 785.658961] kmem_cache_alloc_noprof+0x72/0x690 [ 785.658999] ? getname_flags.part.0+0x48/0x540 [ 785.659035] getname_flags.part.0+0x48/0x540 [ 785.659075] getname_flags+0x95/0xe0 [ 785.659102] user_path_at+0x27/0x90 [ 785.659129] __x64_sys_mount+0x1e9/0x300 [ 785.659161] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.659202] do_syscall_64+0xbf/0x360 [ 785.659228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.659256] RIP: 0033:0x7f6d0c15f04a [ 785.659277] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.659302] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.659328] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 785.659347] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.659363] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 785.659381] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 785.659398] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 785.659450] [ 785.677387] FAULT_INJECTION: forcing a failure. [ 785.677387] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 785.681417] CPU: 0 UID: 0 PID: 6672 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.681438] Tainted: [W]=WARN [ 785.681443] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.681451] Call Trace: [ 785.681456] [ 785.681461] dump_stack_lvl+0xfa/0x120 [ 785.681488] should_fail_ex+0x4d7/0x5e0 [ 785.681507] _copy_from_user+0x30/0xd0 [ 785.681524] copy_mount_options+0x76/0x180 [ 785.681543] __x64_sys_mount+0x1ab/0x300 [ 785.681559] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.681577] do_syscall_64+0xbf/0x360 [ 785.681591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.681605] RIP: 0033:0x7f59eeb5d04a [ 785.681615] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.681628] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.681641] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 785.681650] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.681658] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 785.681670] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 785.681678] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 785.681694] 15:54:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 32) [ 785.710069] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.711214] FAULT_INJECTION: forcing a failure. [ 785.711214] name failslab, interval 1, probability 0, space 0, times 0 [ 785.711254] CPU: 0 UID: 0 PID: 6668 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.711273] Tainted: [W]=WARN [ 785.711278] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.711286] Call Trace: [ 785.711291] [ 785.711296] dump_stack_lvl+0xfa/0x120 [ 785.711320] should_fail_ex+0x4d7/0x5e0 [ 785.711338] ? getname_flags.part.0+0x48/0x540 [ 785.711356] should_failslab+0xc2/0x120 [ 785.711373] kmem_cache_alloc_noprof+0x72/0x690 [ 785.711390] ? getname_flags.part.0+0x48/0x540 [ 785.711407] getname_flags.part.0+0x48/0x540 [ 785.711436] getname_flags+0x95/0xe0 [ 785.711448] user_path_at+0x27/0x90 [ 785.711461] __x64_sys_mount+0x1e9/0x300 [ 785.711475] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.711494] do_syscall_64+0xbf/0x360 [ 785.711506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.711520] RIP: 0033:0x7f6d651ff04a [ 785.711529] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.711542] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.711553] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 785.711562] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.711569] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 785.711577] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 785.711585] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 785.711601] [ 785.731968] FAULT_INJECTION: forcing a failure. [ 785.731968] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 785.734987] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.735079] CPU: 0 UID: 0 PID: 6676 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.735099] Tainted: [W]=WARN [ 785.735104] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.735111] Call Trace: [ 785.735116] [ 785.735121] dump_stack_lvl+0xfa/0x120 [ 785.735143] should_fail_ex+0x4d7/0x5e0 [ 785.735159] _copy_from_user+0x30/0xd0 [ 785.735176] memdup_user+0x7e/0xe0 [ 785.735188] strndup_user+0x78/0xe0 [ 785.735199] __x64_sys_mount+0x136/0x300 [ 785.735214] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.735233] do_syscall_64+0xbf/0x360 [ 785.735245] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.735258] RIP: 0033:0x7f6bdd3d604a [ 785.735267] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.735280] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.735291] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 785.735300] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.735307] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 785.735315] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 785.735323] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 785.735338] 15:54:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 37) 15:54:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 33) 15:54:25 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 36) 15:54:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 785.786342] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.786900] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.795283] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.822604] FAULT_INJECTION: forcing a failure. [ 785.822604] name failslab, interval 1, probability 0, space 0, times 0 [ 785.823735] CPU: 0 UID: 0 PID: 6683 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.823756] Tainted: [W]=WARN [ 785.823760] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.823769] Call Trace: [ 785.823773] [ 785.823779] dump_stack_lvl+0xfa/0x120 [ 785.823803] should_fail_ex+0x4d7/0x5e0 [ 785.823822] should_failslab+0xc2/0x120 [ 785.823838] __kmalloc_cache_noprof+0x73/0x690 [ 785.823856] ? __might_fault+0xe0/0x190 [ 785.823872] ? copy_mount_options+0x55/0x180 [ 785.823891] ? copy_mount_options+0x55/0x180 [ 785.823906] ? memdup_user+0x95/0xe0 [ 785.823917] copy_mount_options+0x55/0x180 [ 785.823934] __x64_sys_mount+0x1ab/0x300 [ 785.823949] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.823967] do_syscall_64+0xbf/0x360 [ 785.823980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.823993] RIP: 0033:0x7f6bdd3d604a [ 785.824003] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.824015] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.824027] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 785.824036] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.824043] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 785.824051] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 785.824059] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 785.824075] [ 785.840026] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.858014] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.859546] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 34) 15:54:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7ffffff2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:25 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 37) [ 785.910617] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 36) [ 785.918306] FAULT_INJECTION: forcing a failure. [ 785.918306] name failslab, interval 1, probability 0, space 0, times 0 [ 785.920265] CPU: 1 UID: 0 PID: 6686 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.920303] Tainted: [W]=WARN [ 785.920312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.920326] Call Trace: [ 785.920334] [ 785.920343] dump_stack_lvl+0xfa/0x120 [ 785.920389] should_fail_ex+0x4d7/0x5e0 [ 785.920420] ? getname_flags.part.0+0x48/0x540 [ 785.920452] should_failslab+0xc2/0x120 [ 785.920479] kmem_cache_alloc_noprof+0x72/0x690 [ 785.920512] ? getname_flags.part.0+0x48/0x540 [ 785.920541] getname_flags.part.0+0x48/0x540 [ 785.920575] getname_flags+0x95/0xe0 [ 785.920597] user_path_at+0x27/0x90 [ 785.920620] __x64_sys_mount+0x1e9/0x300 [ 785.920647] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.920690] do_syscall_64+0xbf/0x360 [ 785.920714] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.920737] RIP: 0033:0x7f6d0c15f04a [ 785.920755] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.920778] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.920800] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 785.920815] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.920830] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 785.920845] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 785.920859] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 785.920889] [ 785.929205] FAULT_INJECTION: forcing a failure. [ 785.929205] name failslab, interval 1, probability 0, space 0, times 0 [ 785.937701] CPU: 0 UID: 0 PID: 6690 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.937722] Tainted: [W]=WARN [ 785.937726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.937734] Call Trace: [ 785.937740] [ 785.937745] dump_stack_lvl+0xfa/0x120 [ 785.937771] should_fail_ex+0x4d7/0x5e0 [ 785.937789] should_failslab+0xc2/0x120 [ 785.937805] __kmalloc_cache_noprof+0x73/0x690 [ 785.937824] ? __might_fault+0xe0/0x190 [ 785.937839] ? copy_mount_options+0x55/0x180 [ 785.937858] ? copy_mount_options+0x55/0x180 [ 785.937873] ? memdup_user+0x95/0xe0 [ 785.937884] copy_mount_options+0x55/0x180 [ 785.937901] __x64_sys_mount+0x1ab/0x300 [ 785.937917] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.937935] do_syscall_64+0xbf/0x360 [ 785.937948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.937962] RIP: 0033:0x7f6bdd3d604a [ 785.937972] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.937984] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.937997] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 785.938005] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.938013] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 785.938021] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 785.938028] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 785.938044] [ 785.990617] SELinux: security_context_str_to_sid () failed with errno=-22 [ 785.990883] FAULT_INJECTION: forcing a failure. [ 785.990883] name failslab, interval 1, probability 0, space 0, times 0 [ 785.992836] CPU: 0 UID: 0 PID: 6694 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 785.992856] Tainted: [W]=WARN [ 785.992860] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 785.992868] Call Trace: [ 785.992873] [ 785.992878] dump_stack_lvl+0xfa/0x120 [ 785.992904] should_fail_ex+0x4d7/0x5e0 [ 785.992922] should_failslab+0xc2/0x120 [ 785.992938] __kmalloc_cache_noprof+0x73/0x690 [ 785.992956] ? find_held_lock+0x2b/0x80 [ 785.992975] ? __get_fs_type+0xe6/0x160 [ 785.992989] ? alloc_fs_context+0x58/0x9e0 [ 785.993011] ? alloc_fs_context+0x58/0x9e0 [ 785.993029] ? _raw_read_unlock+0x1e/0x40 [ 785.993045] alloc_fs_context+0x58/0x9e0 [ 785.993067] path_mount+0xac7/0x1dd0 [ 785.993082] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 785.993096] ? __pfx_path_mount+0x10/0x10 [ 785.993110] ? kmem_cache_free+0x2a1/0x540 [ 785.993120] ? putname.part.0+0x11b/0x160 [ 785.993137] ? getname_flags.part.0+0x1c6/0x540 [ 785.993156] ? putname.part.0+0x11b/0x160 [ 785.993173] __x64_sys_mount+0x27b/0x300 [ 785.993187] ? __pfx___x64_sys_mount+0x10/0x10 [ 785.993206] do_syscall_64+0xbf/0x360 [ 785.993218] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 785.993231] RIP: 0033:0x7f6d651ff04a [ 785.993241] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 785.993253] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 785.993266] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 785.993274] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 785.993281] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 785.993289] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 785.993297] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 785.993313] [ 786.000417] SELinux: security_context_str_to_sid () failed with errno=-22 [ 786.018559] SELinux: security_context_str_to_sid () failed with errno=-22 [ 786.038031] SELinux: security_context_str_to_sid () failed with errno=-22 [ 786.049771] FAULT_INJECTION: forcing a failure. [ 786.049771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 786.050868] CPU: 0 UID: 0 PID: 6700 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 786.050888] Tainted: [W]=WARN [ 786.050892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 786.050900] Call Trace: [ 786.050905] [ 786.050909] dump_stack_lvl+0xfa/0x120 [ 786.050934] should_fail_ex+0x4d7/0x5e0 [ 786.050951] _copy_from_user+0x30/0xd0 [ 786.050968] copy_mount_options+0x76/0x180 [ 786.050986] __x64_sys_mount+0x1ab/0x300 [ 786.051000] ? __pfx___x64_sys_mount+0x10/0x10 [ 786.051019] do_syscall_64+0xbf/0x360 [ 786.051031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 786.051045] RIP: 0033:0x7f59eeb5d04a [ 786.051055] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 786.051066] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 786.051079] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 786.051087] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 786.051096] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 786.051103] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 786.051111] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 786.051127] [ 786.069852] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 38) 15:54:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7ffffff9, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 37) 15:54:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 38) 15:54:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 35) 15:54:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 795.904914] FAULT_INJECTION: forcing a failure. [ 795.904914] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 795.906919] CPU: 1 UID: 0 PID: 6713 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 795.906960] Tainted: [W]=WARN [ 795.906969] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 795.906985] Call Trace: [ 795.906994] [ 795.907004] dump_stack_lvl+0xfa/0x120 [ 795.907052] should_fail_ex+0x4d7/0x5e0 [ 795.907087] strncpy_from_user+0x3b/0x2f0 [ 795.907130] getname_flags.part.0+0x8d/0x540 [ 795.907170] getname_flags+0x95/0xe0 [ 795.907196] user_path_at+0x27/0x90 [ 795.907222] __x64_sys_mount+0x1e9/0x300 [ 795.907252] ? __pfx___x64_sys_mount+0x10/0x10 [ 795.907291] do_syscall_64+0xbf/0x360 [ 795.907316] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 795.907343] RIP: 0033:0x7f6d0c15f04a [ 795.907363] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 795.907388] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 795.907413] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 795.907431] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 795.907447] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 795.907464] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 795.907480] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 795.907513] [ 795.909199] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.914270] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.918472] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.931146] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.932140] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.934748] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.939178] FAULT_INJECTION: forcing a failure. [ 795.939178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 795.944252] CPU: 1 UID: 0 PID: 6722 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 795.944292] Tainted: [W]=WARN [ 795.944302] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 795.944317] Call Trace: [ 795.944325] [ 795.944335] dump_stack_lvl+0xfa/0x120 [ 795.944378] should_fail_ex+0x4d7/0x5e0 [ 795.944412] _copy_from_user+0x30/0xd0 [ 795.944445] copy_mount_options+0x76/0x180 [ 795.944481] __x64_sys_mount+0x1ab/0x300 [ 795.944512] ? __pfx___x64_sys_mount+0x10/0x10 [ 795.944550] do_syscall_64+0xbf/0x360 [ 795.944574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 795.944599] RIP: 0033:0x7f6bdd3d604a [ 795.944618] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 795.944644] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 795.944676] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 795.944694] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 795.944709] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 795.944726] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 795.944742] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 795.944776] [ 795.951554] SELinux: security_context_str_to_sid () failed with errno=-22 [ 795.967180] vfat: Bad value for 'defcontext' [ 795.969118] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 39) [ 796.029021] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 39) 15:54:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 38) 15:54:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 36) 15:54:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x2, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 796.169793] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.171452] FAULT_INJECTION: forcing a failure. [ 796.171452] name failslab, interval 1, probability 0, space 0, times 0 [ 796.173616] CPU: 1 UID: 0 PID: 6729 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 796.173660] Tainted: [W]=WARN [ 796.173676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 796.173692] Call Trace: [ 796.173701] [ 796.173712] dump_stack_lvl+0xfa/0x120 [ 796.173761] should_fail_ex+0x4d7/0x5e0 [ 796.173797] should_failslab+0xc2/0x120 [ 796.173830] __kmalloc_cache_noprof+0x73/0x690 [ 796.173868] ? find_held_lock+0x2b/0x80 [ 796.173907] ? __get_fs_type+0xe6/0x160 [ 796.173937] ? alloc_fs_context+0x58/0x9e0 [ 796.173984] ? alloc_fs_context+0x58/0x9e0 [ 796.174022] ? _raw_read_unlock+0x1e/0x40 [ 796.174057] alloc_fs_context+0x58/0x9e0 [ 796.174104] path_mount+0xac7/0x1dd0 [ 796.174135] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 796.174166] ? __pfx_path_mount+0x10/0x10 [ 796.174195] ? kmem_cache_free+0x2a1/0x540 [ 796.174218] ? putname.part.0+0x11b/0x160 [ 796.174255] ? getname_flags.part.0+0x1c6/0x540 [ 796.174294] ? putname.part.0+0x11b/0x160 [ 796.174333] __x64_sys_mount+0x27b/0x300 [ 796.174364] ? __pfx___x64_sys_mount+0x10/0x10 [ 796.174404] do_syscall_64+0xbf/0x360 [ 796.174430] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.174458] RIP: 0033:0x7f6d0c15f04a [ 796.174478] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 796.174503] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 796.174529] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 796.174547] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 796.174564] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 796.174581] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 796.174598] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 796.174633] [ 796.196160] FAULT_INJECTION: forcing a failure. [ 796.196160] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 796.198354] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.198935] CPU: 0 UID: 0 PID: 6734 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 796.198970] Tainted: [W]=WARN [ 796.198977] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 796.198990] Call Trace: [ 796.198998] [ 796.199007] dump_stack_lvl+0xfa/0x120 [ 796.199048] should_fail_ex+0x4d7/0x5e0 [ 796.199077] strncpy_from_user+0x3b/0x2f0 [ 796.199113] getname_flags.part.0+0x8d/0x540 [ 796.199156] getname_flags+0x95/0xe0 [ 796.199186] user_path_at+0x27/0x90 [ 796.199207] __x64_sys_mount+0x1e9/0x300 [ 796.199232] ? __pfx___x64_sys_mount+0x10/0x10 [ 796.199263] do_syscall_64+0xbf/0x360 [ 796.199284] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.199305] RIP: 0033:0x7f59eeb5d04a [ 796.199321] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 796.199342] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 796.199362] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 796.199376] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 796.199389] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 796.199403] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 796.199416] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 796.199442] [ 796.218933] FAULT_INJECTION: forcing a failure. [ 796.218933] name failslab, interval 1, probability 0, space 0, times 0 [ 796.221435] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.223195] CPU: 0 UID: 0 PID: 6737 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 796.223228] Tainted: [W]=WARN [ 796.223235] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 796.223246] Call Trace: [ 796.223253] [ 796.223261] dump_stack_lvl+0xfa/0x120 [ 796.223292] should_fail_ex+0x4d7/0x5e0 [ 796.223317] should_failslab+0xc2/0x120 [ 796.223342] __kmalloc_cache_noprof+0x73/0x690 [ 796.223372] ? __create_object+0x59/0x80 [ 796.223400] ? fat_init_fs_context+0x51/0x5e0 [ 796.223430] ? trace_kmalloc+0x1f/0xb0 [ 796.223456] ? fat_init_fs_context+0x51/0x5e0 [ 796.223483] fat_init_fs_context+0x51/0x5e0 [ 796.223515] vfat_init_fs_context+0x1c/0x70 [ 796.223545] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 796.223563] alloc_fs_context+0x570/0x9e0 [ 796.223605] path_mount+0xac7/0x1dd0 [ 796.223628] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 796.223651] ? __pfx_path_mount+0x10/0x10 [ 796.223679] ? kmem_cache_free+0x2a1/0x540 [ 796.223696] ? putname.part.0+0x11b/0x160 [ 796.223723] ? getname_flags.part.0+0x1c6/0x540 [ 796.223753] ? putname.part.0+0x11b/0x160 [ 796.223783] __x64_sys_mount+0x27b/0x300 [ 796.223806] ? __pfx___x64_sys_mount+0x10/0x10 [ 796.223837] do_syscall_64+0xbf/0x360 [ 796.223856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.223876] RIP: 0033:0x7f6d651ff04a [ 796.223891] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 796.223911] RSP: 002b:00007f6d62751fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 796.223930] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 796.223944] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 796.223956] RBP: 00007f6d62752040 R08: 00007f6d62752040 R09: 0000000020000080 [ 796.223970] R10: 0000000001000001 R11: 0000000000000202 R12: 0000000020000080 [ 796.223982] R13: 00000000200000c0 R14: 00007f6d62752000 R15: 0000000020000400 [ 796.224009] [ 796.224928] FAULT_INJECTION: forcing a failure. [ 796.224928] name failslab, interval 1, probability 0, space 0, times 0 [ 796.241972] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.242263] CPU: 0 UID: 0 PID: 6736 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 796.242297] Tainted: [W]=WARN [ 796.242304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 796.242316] Call Trace: [ 796.242322] [ 796.242330] dump_stack_lvl+0xfa/0x120 [ 796.242361] should_fail_ex+0x4d7/0x5e0 [ 796.242386] ? getname_flags.part.0+0x48/0x540 [ 796.242412] should_failslab+0xc2/0x120 [ 796.242435] kmem_cache_alloc_noprof+0x72/0x690 [ 796.242463] ? getname_flags.part.0+0x48/0x540 [ 796.242489] getname_flags.part.0+0x48/0x540 [ 796.242519] getname_flags+0x95/0xe0 [ 796.242539] user_path_at+0x27/0x90 [ 796.242559] __x64_sys_mount+0x1e9/0x300 [ 796.242582] ? __pfx___x64_sys_mount+0x10/0x10 [ 796.242612] do_syscall_64+0xbf/0x360 [ 796.242631] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.242651] RIP: 0033:0x7f6bdd3d604a [ 796.242672] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 796.242692] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 796.242712] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 796.242725] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 796.242738] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 796.242751] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 796.242764] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 796.242790] 15:54:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 39) 15:54:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 796.353193] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.383275] FAULT_INJECTION: forcing a failure. [ 796.383275] name failslab, interval 1, probability 0, space 0, times 0 [ 796.384927] CPU: 0 UID: 0 PID: 6743 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 796.384958] Tainted: [W]=WARN [ 796.384964] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 796.384976] Call Trace: [ 796.384983] [ 796.384990] dump_stack_lvl+0xfa/0x120 [ 796.385027] should_fail_ex+0x4d7/0x5e0 [ 796.385053] should_failslab+0xc2/0x120 [ 796.385076] __kmalloc_cache_noprof+0x73/0x690 [ 796.385103] ? find_held_lock+0x2b/0x80 [ 796.385131] ? __get_fs_type+0xe6/0x160 [ 796.385152] ? alloc_fs_context+0x58/0x9e0 [ 796.385186] ? alloc_fs_context+0x58/0x9e0 [ 796.385212] ? _raw_read_unlock+0x1e/0x40 [ 796.385236] alloc_fs_context+0x58/0x9e0 [ 796.385268] path_mount+0xac7/0x1dd0 [ 796.385290] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 796.385312] ? __pfx_path_mount+0x10/0x10 [ 796.385332] ? kmem_cache_free+0x2a1/0x540 [ 796.385347] ? putname.part.0+0x11b/0x160 [ 796.385373] ? getname_flags.part.0+0x1c6/0x540 [ 796.385400] ? putname.part.0+0x11b/0x160 [ 796.385427] __x64_sys_mount+0x27b/0x300 [ 796.385448] ? __pfx___x64_sys_mount+0x10/0x10 [ 796.385476] do_syscall_64+0xbf/0x360 [ 796.385494] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.385513] RIP: 0033:0x7f59eeb5d04a [ 796.385527] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 796.385545] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 796.385563] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 796.385576] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 796.385588] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 796.385600] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 796.385611] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 796.385636] [ 796.385897] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:36 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 40) 15:54:36 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1e1f, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 796.459485] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.476279] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.489247] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.492000] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.504601] SELinux: security_context_str_to_sid () failed with errno=-22 [ 796.527148] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:54:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 40) 15:54:44 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 40) 15:54:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 41) 15:54:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:44 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1f1e, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 37) [ 804.466293] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.467999] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.479937] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.482557] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.489261] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.489707] vfat: Bad value for 'defcontext' [ 804.498243] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.498330] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.501646] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.503301] FAULT_INJECTION: forcing a failure. [ 804.503301] name failslab, interval 1, probability 0, space 0, times 0 [ 804.505312] CPU: 0 UID: 0 PID: 6768 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 804.505350] Tainted: [W]=WARN [ 804.505359] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 804.505373] Call Trace: [ 804.505381] [ 804.505389] dump_stack_lvl+0xfa/0x120 [ 804.505433] should_fail_ex+0x4d7/0x5e0 [ 804.505464] should_failslab+0xc2/0x120 [ 804.505492] __kmalloc_cache_noprof+0x73/0x690 [ 804.505526] ? __create_object+0x59/0x80 [ 804.505558] ? fat_init_fs_context+0x51/0x5e0 [ 804.505591] ? trace_kmalloc+0x1f/0xb0 [ 804.505620] ? fat_init_fs_context+0x51/0x5e0 [ 804.505651] fat_init_fs_context+0x51/0x5e0 [ 804.505694] vfat_init_fs_context+0x1c/0x70 [ 804.505715] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 804.505736] alloc_fs_context+0x570/0x9e0 [ 804.505779] path_mount+0xac7/0x1dd0 [ 804.505805] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 804.505832] ? __pfx_path_mount+0x10/0x10 [ 804.505857] ? kmem_cache_free+0x2a1/0x540 [ 804.505876] ? putname.part.0+0x11b/0x160 [ 804.505908] ? getname_flags.part.0+0x1c6/0x540 [ 804.505941] ? putname.part.0+0x11b/0x160 [ 804.505974] __x64_sys_mount+0x27b/0x300 [ 804.506000] ? __pfx___x64_sys_mount+0x10/0x10 [ 804.506034] do_syscall_64+0xbf/0x360 [ 804.506057] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 804.506080] RIP: 0033:0x7f6d0c15f04a [ 804.506098] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 804.506120] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 804.506142] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 804.506157] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 804.506172] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 804.506186] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 804.506200] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 804.506230] 15:54:44 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:44 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x4, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:44 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:44 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 38) 15:54:44 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 41) 15:54:44 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 41) 15:54:44 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 42) [ 804.680131] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.688489] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.710980] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.721076] FAULT_INJECTION: forcing a failure. [ 804.721076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 804.722749] CPU: 0 UID: 0 PID: 6782 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 804.722786] Tainted: [W]=WARN [ 804.722794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 804.722807] Call Trace: [ 804.722815] [ 804.722825] dump_stack_lvl+0xfa/0x120 [ 804.722866] should_fail_ex+0x4d7/0x5e0 [ 804.722897] strncpy_from_user+0x3b/0x2f0 [ 804.722935] getname_flags.part.0+0x8d/0x540 [ 804.722971] getname_flags+0x95/0xe0 [ 804.722993] user_path_at+0x27/0x90 [ 804.723016] __x64_sys_mount+0x1e9/0x300 [ 804.723044] ? __pfx___x64_sys_mount+0x10/0x10 [ 804.723078] do_syscall_64+0xbf/0x360 [ 804.723100] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 804.723124] RIP: 0033:0x7f6bdd3d604a [ 804.723142] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 804.723164] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 804.723186] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 804.723201] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 804.723215] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 804.723229] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 804.723243] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 804.723272] [ 804.724154] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.744433] FAULT_INJECTION: forcing a failure. [ 804.744433] name failslab, interval 1, probability 0, space 0, times 0 [ 804.751330] CPU: 0 UID: 0 PID: 6784 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 804.751367] Tainted: [W]=WARN [ 804.751374] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 804.751387] Call Trace: [ 804.751395] [ 804.751404] dump_stack_lvl+0xfa/0x120 [ 804.751440] should_fail_ex+0x4d7/0x5e0 [ 804.751470] should_failslab+0xc2/0x120 [ 804.751497] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 804.751527] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 804.751557] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 804.751585] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 804.751631] ? kmemdup_nul+0x3b/0xa0 [ 804.751671] kmemdup_nul+0x3b/0xa0 [ 804.751706] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 804.751741] security_sb_eat_lsm_opts+0x42/0x90 [ 804.751778] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 804.751813] vfs_parse_monolithic_sep+0x9c/0x200 [ 804.751849] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 804.751884] ? vfat_init_fs_context+0x55/0x70 [ 804.751907] ? alloc_fs_context+0x5c0/0x9e0 [ 804.751947] path_mount+0x12e5/0x1dd0 [ 804.751973] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 804.751998] ? __pfx_path_mount+0x10/0x10 [ 804.752023] ? kmem_cache_free+0x2a1/0x540 [ 804.752042] ? putname.part.0+0x11b/0x160 [ 804.752072] ? getname_flags.part.0+0x1c6/0x540 [ 804.752106] ? putname.part.0+0x11b/0x160 [ 804.752139] __x64_sys_mount+0x27b/0x300 [ 804.752165] ? __pfx___x64_sys_mount+0x10/0x10 [ 804.752200] do_syscall_64+0xbf/0x360 [ 804.752221] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 804.752244] RIP: 0033:0x7f6d651ff04a [ 804.752261] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 804.752282] RSP: 002b:00007f6d62772fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 804.752304] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d651ff04a [ 804.752319] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 804.752333] RBP: 00007f6d62773040 R08: 00007f6d62773040 R09: 0000000020000080 [ 804.752348] R10: 0000000001000001 R11: 0000000000000206 R12: 0000000020000080 [ 804.752362] R13: 00000000200000c0 R14: 00007f6d62773000 R15: 0000000020000400 [ 804.752392] [ 804.752890] FAULT_INJECTION: forcing a failure. [ 804.752890] name failslab, interval 1, probability 0, space 0, times 0 [ 804.761386] SELinux: security_context_str_to_sid () failed with errno=-22 [ 804.761725] CPU: 1 UID: 0 PID: 6786 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 804.761763] Tainted: [W]=WARN [ 804.761771] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 804.761784] Call Trace: [ 804.761791] [ 804.761800] dump_stack_lvl+0xfa/0x120 [ 804.761835] should_fail_ex+0x4d7/0x5e0 [ 804.761864] should_failslab+0xc2/0x120 [ 804.761890] __kmalloc_cache_noprof+0x73/0x690 [ 804.761922] ? __create_object+0x59/0x80 [ 804.761953] ? fat_init_fs_context+0x51/0x5e0 [ 804.761987] ? trace_kmalloc+0x1f/0xb0 [ 804.762016] ? fat_init_fs_context+0x51/0x5e0 [ 804.762047] fat_init_fs_context+0x51/0x5e0 [ 804.762084] vfat_init_fs_context+0x1c/0x70 [ 804.762113] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 804.762145] alloc_fs_context+0x570/0x9e0 [ 804.762209] path_mount+0xac7/0x1dd0 [ 804.762235] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 804.762261] ? __pfx_path_mount+0x10/0x10 [ 804.762285] ? kmem_cache_free+0x2a1/0x540 [ 804.762305] ? putname.part.0+0x11b/0x160 [ 804.762335] ? getname_flags.part.0+0x1c6/0x540 [ 804.762369] ? putname.part.0+0x11b/0x160 [ 804.762402] __x64_sys_mount+0x27b/0x300 [ 804.762428] ? __pfx___x64_sys_mount+0x10/0x10 [ 804.762462] do_syscall_64+0xbf/0x360 [ 804.762484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 804.762506] RIP: 0033:0x7f59eeb5d04a [ 804.762523] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 804.762545] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 804.762566] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 804.762582] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 804.762596] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 804.762611] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 804.762626] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 804.762655] [ 804.852816] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 804.886079] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2010, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 39) 15:54:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1eef, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 42) 15:54:53 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x5, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:53 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 43) 15:54:53 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 42) [ 813.996528] FAULT_INJECTION: forcing a failure. [ 813.996528] name failslab, interval 1, probability 0, space 0, times 0 [ 813.998990] CPU: 0 UID: 0 PID: 6806 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 813.999038] Tainted: [W]=WARN [ 813.999048] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 813.999065] Call Trace: [ 813.999074] [ 813.999086] dump_stack_lvl+0xfa/0x120 [ 813.999138] should_fail_ex+0x4d7/0x5e0 [ 813.999177] should_failslab+0xc2/0x120 [ 813.999212] __kmalloc_cache_noprof+0x73/0x690 [ 813.999254] ? find_held_lock+0x2b/0x80 [ 813.999297] ? __get_fs_type+0xe6/0x160 [ 813.999328] ? alloc_fs_context+0x58/0x9e0 [ 813.999379] ? alloc_fs_context+0x58/0x9e0 [ 813.999422] ? _raw_read_unlock+0x1e/0x40 [ 813.999458] alloc_fs_context+0x58/0x9e0 [ 813.999510] path_mount+0xac7/0x1dd0 [ 813.999544] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 813.999578] ? __pfx_path_mount+0x10/0x10 [ 813.999609] ? kmem_cache_free+0x2a1/0x540 [ 813.999635] ? putname.part.0+0x11b/0x160 [ 813.999684] ? getname_flags.part.0+0x1c6/0x540 [ 813.999749] ? putname.part.0+0x11b/0x160 [ 813.999792] __x64_sys_mount+0x27b/0x300 [ 813.999825] ? __pfx___x64_sys_mount+0x10/0x10 [ 813.999869] do_syscall_64+0xbf/0x360 [ 813.999897] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 813.999927] RIP: 0033:0x7f6bdd3d604a [ 813.999949] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 813.999978] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 814.000007] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 814.000027] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 814.000045] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 814.000065] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 814.000082] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 814.000121] [ 814.005757] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.019062] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.025571] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.030038] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.030819] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.032652] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.034411] FAULT_INJECTION: forcing a failure. [ 814.034411] name failslab, interval 1, probability 0, space 0, times 0 [ 814.040091] CPU: 1 UID: 0 PID: 6808 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 814.040131] Tainted: [W]=WARN [ 814.040140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 814.040155] Call Trace: [ 814.040164] [ 814.040174] dump_stack_lvl+0xfa/0x120 [ 814.040219] should_fail_ex+0x4d7/0x5e0 [ 814.040253] should_failslab+0xc2/0x120 [ 814.040284] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 814.040313] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 814.040346] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 814.040378] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 814.040411] ? kmemdup_nul+0x3b/0xa0 [ 814.040448] kmemdup_nul+0x3b/0xa0 [ 814.040487] selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 814.040526] security_sb_eat_lsm_opts+0x42/0x90 [ 814.040563] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 814.040602] vfs_parse_monolithic_sep+0x9c/0x200 [ 814.040643] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 814.040690] ? vfat_init_fs_context+0x55/0x70 [ 814.040715] ? alloc_fs_context+0x5c0/0x9e0 [ 814.040761] path_mount+0x12e5/0x1dd0 [ 814.040795] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 814.040823] ? __pfx_path_mount+0x10/0x10 [ 814.040851] ? kmem_cache_free+0x2a1/0x540 [ 814.040873] ? putname.part.0+0x11b/0x160 [ 814.040908] ? getname_flags.part.0+0x1c6/0x540 [ 814.040946] ? putname.part.0+0x11b/0x160 [ 814.040983] __x64_sys_mount+0x27b/0x300 [ 814.041012] ? __pfx___x64_sys_mount+0x10/0x10 [ 814.041050] do_syscall_64+0xbf/0x360 [ 814.041075] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 814.041102] RIP: 0033:0x7f6d0c15f04a [ 814.041121] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 814.041145] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 814.041170] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 814.041187] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 814.041203] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 814.041219] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 814.041235] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 814.041268] [ 814.062314] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.073599] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:53 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x6, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:53 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 43) 15:54:53 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x80000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:54:53 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 40) 15:54:53 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:54:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 43) [ 814.234587] SELinux: security_context_str_to_sid () failed with errno=-22 15:54:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 814.263687] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.265040] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.269598] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.294361] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.311468] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.318131] FAULT_INJECTION: forcing a failure. [ 814.318131] name failslab, interval 1, probability 0, space 0, times 0 [ 814.319896] CPU: 1 UID: 0 PID: 6822 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 814.319933] Tainted: [W]=WARN [ 814.319941] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 814.319954] Call Trace: [ 814.319962] [ 814.319971] dump_stack_lvl+0xfa/0x120 [ 814.320009] should_fail_ex+0x4d7/0x5e0 [ 814.320039] should_failslab+0xc2/0x120 [ 814.320066] __kmalloc_cache_noprof+0x73/0x690 [ 814.320099] ? find_held_lock+0x2b/0x80 [ 814.320132] ? __get_fs_type+0xe6/0x160 [ 814.320157] ? alloc_fs_context+0x58/0x9e0 [ 814.320197] ? alloc_fs_context+0x58/0x9e0 [ 814.320229] ? _raw_read_unlock+0x1e/0x40 [ 814.320258] alloc_fs_context+0x58/0x9e0 [ 814.320299] path_mount+0xac7/0x1dd0 [ 814.320324] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 814.320350] ? __pfx_path_mount+0x10/0x10 [ 814.320375] ? kmem_cache_free+0x2a1/0x540 [ 814.320394] ? putname.part.0+0x11b/0x160 [ 814.320425] ? getname_flags.part.0+0x1c6/0x540 [ 814.320459] ? putname.part.0+0x11b/0x160 [ 814.320492] __x64_sys_mount+0x27b/0x300 [ 814.320518] ? __pfx___x64_sys_mount+0x10/0x10 [ 814.320552] do_syscall_64+0xbf/0x360 [ 814.320574] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 814.320596] RIP: 0033:0x7f6bdd3d604a [ 814.320613] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 814.320635] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 814.320657] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 814.320680] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 814.320694] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 814.320709] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 814.320723] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 814.320752] [ 814.323042] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.329197] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.371258] SELinux: security_context_str_to_sid () failed with errno=-22 [ 814.384135] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 44) 15:55:04 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x7, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:04 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 44) 15:55:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:04 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 44) 15:55:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xe0ffff, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:04 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 41) [ 824.485318] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.488151] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.489874] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:04 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 824.523412] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.533614] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.546902] FAULT_INJECTION: forcing a failure. [ 824.546902] name failslab, interval 1, probability 0, space 0, times 0 [ 824.548073] CPU: 0 UID: 0 PID: 6850 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 824.548108] Tainted: [W]=WARN [ 824.548116] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 824.548126] Call Trace: [ 824.548132] [ 824.548137] dump_stack_lvl+0xfa/0x120 [ 824.548165] should_fail_ex+0x4d7/0x5e0 [ 824.548185] should_failslab+0xc2/0x120 [ 824.548192] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.548204] __kmalloc_cache_noprof+0x73/0x690 [ 824.548227] ? __create_object+0x59/0x80 [ 824.548247] ? fat_init_fs_context+0x51/0x5e0 [ 824.548268] ? trace_kmalloc+0x1f/0xb0 [ 824.548286] ? fat_init_fs_context+0x51/0x5e0 [ 824.548305] fat_init_fs_context+0x51/0x5e0 [ 824.548327] vfat_init_fs_context+0x1c/0x70 [ 824.548340] ? __pfx_vfat_init_fs_context+0x10/0x10 [ 824.548353] alloc_fs_context+0x570/0x9e0 [ 824.548382] path_mount+0xac7/0x1dd0 [ 824.548399] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 824.548416] ? __pfx_path_mount+0x10/0x10 [ 824.548432] ? kmem_cache_free+0x2a1/0x540 [ 824.548444] ? putname.part.0+0x11b/0x160 [ 824.548463] ? getname_flags.part.0+0x1c6/0x540 [ 824.548484] ? putname.part.0+0x11b/0x160 [ 824.548505] __x64_sys_mount+0x27b/0x300 [ 824.548521] ? __pfx___x64_sys_mount+0x10/0x10 [ 824.548542] do_syscall_64+0xbf/0x360 [ 824.548556] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 824.548571] RIP: 0033:0x7f6bdd3d604a [ 824.548582] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 824.548597] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 824.548611] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 824.548620] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 824.548629] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 824.548638] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 824.548646] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 824.548670] [ 824.554105] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.574290] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.576266] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 824.581336] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.583200] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:04 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:04 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x8, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 824.640145] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.647610] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.715473] SELinux: security_context_str_to_sid () failed with errno=-22 [ 824.733862] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 42) 15:55:12 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 45) 15:55:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x10, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:12 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 45) 15:55:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xef1e, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 45) 15:55:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1f72, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 832.745886] vfat: Bad value for 'defcontext' 15:55:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 43) [ 832.784423] FAULT_INJECTION: forcing a failure. [ 832.784423] name failslab, interval 1, probability 0, space 0, times 0 [ 832.785415] CPU: 1 UID: 0 PID: 6869 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 832.785436] Tainted: [W]=WARN [ 832.785440] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.785449] Call Trace: [ 832.785453] [ 832.785459] dump_stack_lvl+0xfa/0x120 [ 832.785486] should_fail_ex+0x4d7/0x5e0 [ 832.785504] should_failslab+0xc2/0x120 [ 832.785520] __kmalloc_cache_noprof+0x73/0x690 [ 832.785539] ? trace_kmalloc+0x1f/0xb0 [ 832.785553] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 832.785567] ? selinux_add_opt+0x303/0x3f0 [ 832.785583] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 832.785600] ? selinux_add_opt+0x303/0x3f0 [ 832.785614] selinux_add_opt+0x303/0x3f0 [ 832.785630] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 832.785648] security_sb_eat_lsm_opts+0x42/0x90 [ 832.785667] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 832.785687] vfs_parse_monolithic_sep+0x9c/0x200 [ 832.785707] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 832.785729] ? vfat_init_fs_context+0x55/0x70 [ 832.785741] ? alloc_fs_context+0x5c0/0x9e0 [ 832.785763] path_mount+0x12e5/0x1dd0 [ 832.785778] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 832.785794] ? __pfx_path_mount+0x10/0x10 [ 832.785807] ? kmem_cache_free+0x2a1/0x540 [ 832.785817] ? putname.part.0+0x11b/0x160 [ 832.785835] ? getname_flags.part.0+0x1c6/0x540 [ 832.785853] ? putname.part.0+0x11b/0x160 [ 832.785871] __x64_sys_mount+0x27b/0x300 [ 832.785885] ? __pfx___x64_sys_mount+0x10/0x10 [ 832.785903] do_syscall_64+0xbf/0x360 [ 832.785915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 832.785929] RIP: 0033:0x7f6d0c15f04a [ 832.785939] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.785951] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 832.785963] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 832.785972] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 832.785979] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 832.785988] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 832.785995] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 832.786011] [ 832.786438] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.807417] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.817852] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.824862] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.826128] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.829107] FAULT_INJECTION: forcing a failure. [ 832.829107] name failslab, interval 1, probability 0, space 0, times 0 [ 832.830901] CPU: 0 UID: 0 PID: 6878 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 832.830938] Tainted: [W]=WARN [ 832.830947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.830961] Call Trace: [ 832.830970] [ 832.830980] dump_stack_lvl+0xfa/0x120 [ 832.831023] should_fail_ex+0x4d7/0x5e0 [ 832.831058] should_failslab+0xc2/0x120 [ 832.831087] __kmalloc_cache_noprof+0x73/0x690 [ 832.831121] ? trace_kmalloc+0x1f/0xb0 [ 832.831148] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 832.831176] ? selinux_add_opt+0x303/0x3f0 [ 832.831204] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 832.831238] ? selinux_add_opt+0x303/0x3f0 [ 832.831266] selinux_add_opt+0x303/0x3f0 [ 832.831296] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 832.831333] security_sb_eat_lsm_opts+0x42/0x90 [ 832.831370] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 832.831406] vfs_parse_monolithic_sep+0x9c/0x200 [ 832.831445] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 832.831483] ? vfat_init_fs_context+0x55/0x70 [ 832.831506] ? alloc_fs_context+0x5c0/0x9e0 [ 832.831550] path_mount+0x12e5/0x1dd0 [ 832.831578] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 832.831606] ? __pfx_path_mount+0x10/0x10 [ 832.831633] ? kmem_cache_free+0x2a1/0x540 [ 832.831654] ? putname.part.0+0x11b/0x160 [ 832.831695] ? getname_flags.part.0+0x1c6/0x540 [ 832.831731] ? putname.part.0+0x11b/0x160 [ 832.831767] __x64_sys_mount+0x27b/0x300 [ 832.831794] ? __pfx___x64_sys_mount+0x10/0x10 [ 832.831830] do_syscall_64+0xbf/0x360 [ 832.831854] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 832.831890] RIP: 0033:0x7f59eeb5d04a [ 832.831909] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.831932] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 832.831956] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 832.831972] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 832.831988] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 832.832003] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 832.832018] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 832.832049] [ 832.835152] FAULT_INJECTION: forcing a failure. [ 832.835152] name failslab, interval 1, probability 0, space 0, times 0 [ 832.839279] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.839412] CPU: 1 UID: 0 PID: 6880 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 832.839433] Tainted: [W]=WARN [ 832.839437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.839444] Call Trace: [ 832.839449] [ 832.839454] dump_stack_lvl+0xfa/0x120 [ 832.839475] should_fail_ex+0x4d7/0x5e0 [ 832.839490] should_failslab+0xc2/0x120 [ 832.839505] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 832.839518] ? find_held_lock+0x2b/0x80 [ 832.839538] ? vfs_parse_fs_string+0xc3/0x150 [ 832.839555] ? __create_object+0x59/0x80 [ 832.839576] ? kmemdup_nul+0x3b/0xa0 [ 832.839594] kmemdup_nul+0x3b/0xa0 [ 832.839612] vfs_parse_fs_string+0xc3/0x150 [ 832.839631] ? __pfx_vfs_parse_fs_string+0x10/0x10 [ 832.839657] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 832.839679] vfs_parse_monolithic_sep+0x177/0x200 [ 832.839699] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 832.839718] ? vfat_init_fs_context+0x55/0x70 [ 832.839730] ? alloc_fs_context+0x5c0/0x9e0 [ 832.839752] path_mount+0x12e5/0x1dd0 [ 832.839766] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 832.839780] ? __pfx_path_mount+0x10/0x10 [ 832.839793] ? kmem_cache_free+0x2a1/0x540 [ 832.839804] ? putname.part.0+0x11b/0x160 15:55:12 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 46) [ 832.839820] ? getname_flags.part.0+0x1c6/0x540 [ 832.839838] ? putname.part.0+0x11b/0x160 [ 832.839856] __x64_sys_mount+0x27b/0x300 [ 832.839871] ? __pfx___x64_sys_mount+0x10/0x10 [ 832.839897] do_syscall_64+0xbf/0x360 [ 832.839910] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 832.839922] RIP: 0033:0x7f6bdd3d604a [ 832.839931] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 832.839942] RSP: 002b:00007f6bda949fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 832.839954] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bdd3d604a [ 832.839962] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 832.839970] RBP: 00007f6bda94a040 R08: 00007f6bda94a040 R09: 0000000020000080 [ 832.839978] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 832.839985] R13: 00000000200000c0 R14: 00007f6bda94a000 R15: 0000000020000400 [ 832.840001] [ 832.848409] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.863047] FAULT_INJECTION: forcing a failure. [ 832.863047] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 832.891116] CPU: 0 UID: 0 PID: 6879 Comm: syz-executor.7 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 832.891157] Tainted: [W]=WARN [ 832.891166] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 832.891181] Call Trace: [ 832.891190] [ 832.891201] dump_stack_lvl+0xfa/0x120 [ 832.891248] should_fail_ex+0x4d7/0x5e0 [ 832.891282] _copy_to_user+0x32/0xd0 [ 832.891315] simple_read_from_buffer+0xe0/0x180 [ 832.891358] proc_fail_nth_read+0x18a/0x240 [ 832.891388] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 832.891415] ? security_file_permission+0x22/0x90 [ 832.891454] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 832.891480] vfs_read+0x1eb/0xc70 [ 832.891511] ? __pfx_vfs_read+0x10/0x10 [ 832.891537] ? lock_release+0xc8/0x290 [ 832.891571] ? __fget_files+0x20d/0x3b0 [ 832.891605] ksys_read+0x121/0x240 [ 832.891629] ? __pfx_ksys_read+0x10/0x10 [ 832.891671] do_syscall_64+0xbf/0x360 [ 832.891696] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 832.891721] RIP: 0033:0x7f6d651b069c [ 832.891741] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 832.891764] RSP: 002b:00007f6d62773170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 832.891788] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6d651b069c [ 832.891805] RDX: 000000000000000f RSI: 00007f6d627731e0 RDI: 0000000000000004 [ 832.891820] RBP: 00007f6d627731d0 R08: 0000000000000000 R09: 0000000020000080 [ 832.891835] R10: 0000000001000001 R11: 0000000000000246 R12: 0000000000000002 [ 832.891851] R13: 00007ffdb43e95af R14: 00007f6d62773300 R15: 0000000000022000 [ 832.891893] [ 832.922649] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:55:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:12 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 47) 15:55:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 46) 15:55:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x300, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 832.989636] SELinux: security_context_str_to_sid () failed with errno=-22 [ 832.993722] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.018018] FAULT_INJECTION: forcing a failure. [ 833.018018] name failslab, interval 1, probability 0, space 0, times 0 [ 833.018995] CPU: 1 UID: 0 PID: 6887 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 833.019016] Tainted: [W]=WARN [ 833.019020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.019029] Call Trace: [ 833.019033] [ 833.019038] dump_stack_lvl+0xfa/0x120 [ 833.019063] should_fail_ex+0x4d7/0x5e0 [ 833.019082] should_failslab+0xc2/0x120 [ 833.019097] __kmalloc_node_track_caller_noprof+0xc1/0x6e0 [ 833.019113] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 833.019134] ? security_context_to_sid_core+0xaf/0x850 [ 833.019154] ? kmemdup_nul+0x3b/0xa0 [ 833.019172] kmemdup_nul+0x3b/0xa0 [ 833.019190] security_context_to_sid_core+0xaf/0x850 [ 833.019205] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 833.019218] ? __pfx_security_context_to_sid_core+0x10/0x10 [ 833.019233] ? __create_object+0x59/0x80 [ 833.019252] ? trace_kmalloc+0x1f/0xb0 [ 833.019266] ? __kmalloc_cache_noprof+0x26f/0x690 [ 833.019282] ? trace_kmalloc+0x1f/0xb0 [ 833.019296] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 833.019314] selinux_add_opt+0x240/0x3f0 [ 833.019331] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 833.019350] security_sb_eat_lsm_opts+0x42/0x90 [ 833.019369] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 833.019388] vfs_parse_monolithic_sep+0x9c/0x200 [ 833.019408] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 833.019427] ? vfat_init_fs_context+0x55/0x70 [ 833.019439] ? alloc_fs_context+0x5c0/0x9e0 [ 833.019461] path_mount+0x12e5/0x1dd0 [ 833.019476] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 833.019489] ? __pfx_path_mount+0x10/0x10 [ 833.019503] ? kmem_cache_free+0x2a1/0x540 [ 833.019513] ? putname.part.0+0x11b/0x160 [ 833.019531] ? getname_flags.part.0+0x1c6/0x540 [ 833.019549] ? putname.part.0+0x11b/0x160 [ 833.019567] __x64_sys_mount+0x27b/0x300 [ 833.019581] ? __pfx___x64_sys_mount+0x10/0x10 [ 833.019599] do_syscall_64+0xbf/0x360 [ 833.019612] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.019625] RIP: 0033:0x7f6d0c15f04a [ 833.019635] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.019648] RSP: 002b:00007f6d096d2fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 833.019664] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6d0c15f04a [ 833.019673] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 833.019680] RBP: 00007f6d096d3040 R08: 00007f6d096d3040 R09: 0000000020000080 [ 833.019688] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 [ 833.019696] R13: 00000000200000c0 R14: 00007f6d096d3000 R15: 0000000020000400 [ 833.019712] [ 833.038920] SELinux: security_context_str_to_sid (s) failed with errno=-12 15:55:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xe0ffff, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 833.070755] FAULT_INJECTION: forcing a failure. [ 833.070755] name failslab, interval 1, probability 0, space 0, times 0 [ 833.072612] CPU: 0 UID: 0 PID: 6890 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 833.072651] Tainted: [W]=WARN [ 833.072660] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.072681] Call Trace: 15:55:12 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 833.072689] [ 833.072698] dump_stack_lvl+0xfa/0x120 [ 833.072741] should_fail_ex+0x4d7/0x5e0 [ 833.072774] should_failslab+0xc2/0x120 [ 833.072803] __kmalloc_cache_noprof+0x73/0x690 [ 833.072838] ? trace_kmalloc+0x1f/0xb0 [ 833.072865] ? __kmalloc_node_track_caller_noprof+0x2a2/0x6e0 [ 833.072893] ? selinux_add_opt+0x303/0x3f0 [ 833.072921] ? selinux_sb_eat_lsm_opts+0x351/0x6b0 [ 833.072956] ? selinux_add_opt+0x303/0x3f0 [ 833.072984] selinux_add_opt+0x303/0x3f0 [ 833.073014] selinux_sb_eat_lsm_opts+0x37a/0x6b0 [ 833.073052] security_sb_eat_lsm_opts+0x42/0x90 [ 833.073088] ? __pfx_vfs_parse_comma_sep+0x10/0x10 [ 833.073124] vfs_parse_monolithic_sep+0x9c/0x200 [ 833.073164] ? __pfx_vfs_parse_monolithic_sep+0x10/0x10 [ 833.073201] ? vfat_init_fs_context+0x55/0x70 [ 833.073224] ? alloc_fs_context+0x5c0/0x9e0 [ 833.073268] path_mount+0x12e5/0x1dd0 [ 833.073297] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 833.073325] ? __pfx_path_mount+0x10/0x10 [ 833.073352] ? kmem_cache_free+0x2a1/0x540 [ 833.073373] ? putname.part.0+0x11b/0x160 [ 833.073406] ? getname_flags.part.0+0x1c6/0x540 [ 833.073442] ? putname.part.0+0x11b/0x160 [ 833.073478] __x64_sys_mount+0x27b/0x300 [ 833.073505] ? __pfx___x64_sys_mount+0x10/0x10 [ 833.073543] do_syscall_64+0xbf/0x360 [ 833.073566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.073591] RIP: 0033:0x7f59eeb5d04a [ 833.073610] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 833.073632] RSP: 002b:00007f59ec0d0fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 833.073656] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59eeb5d04a [ 833.073672] RDX: 0000000020000080 RSI: 00000000200000c0 RDI: 0000000000000000 [ 833.073687] RBP: 00007f59ec0d1040 R08: 00007f59ec0d1040 R09: 0000000020000080 [ 833.073703] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000080 15:55:12 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 44) [ 833.073718] R13: 00000000200000c0 R14: 00007f59ec0d1000 R15: 0000000020000400 [ 833.073749] [ 833.084848] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.095220] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.116492] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.120530] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.124999] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.127374] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.133517] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.142277] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:12 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 833.173293] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.177307] vfat: Bad value for 'defcontext' 15:55:12 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) (fail_nth: 47) 15:55:12 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:12 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x500, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 833.218327] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:12 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:12 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 833.246980] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.275419] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.279165] FAULT_INJECTION: forcing a failure. [ 833.279165] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 833.280111] CPU: 1 UID: 0 PID: 6907 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 833.280132] Tainted: [W]=WARN [ 833.280136] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 833.280145] Call Trace: [ 833.280150] [ 833.280155] dump_stack_lvl+0xfa/0x120 [ 833.280189] should_fail_ex+0x4d7/0x5e0 [ 833.280208] _copy_to_user+0x32/0xd0 [ 833.280227] simple_read_from_buffer+0xe0/0x180 [ 833.280248] proc_fail_nth_read+0x18a/0x240 [ 833.280264] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 833.280278] ? security_file_permission+0x22/0x90 [ 833.280298] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 833.280311] vfs_read+0x1eb/0xc70 [ 833.280327] ? __pfx_vfs_read+0x10/0x10 [ 833.280340] ? lock_release+0xc8/0x290 [ 833.280358] ? __fget_files+0x20d/0x3b0 [ 833.280376] ksys_read+0x121/0x240 [ 833.280388] ? __pfx_ksys_read+0x10/0x10 [ 833.280405] do_syscall_64+0xbf/0x360 [ 833.280418] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 833.280432] RIP: 0033:0x7f59eeb0e69c [ 833.280442] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 833.280454] RSP: 002b:00007f59ec0d1170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 833.280466] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f59eeb0e69c [ 833.280475] RDX: 000000000000000f RSI: 00007f59ec0d11e0 RDI: 0000000000000004 [ 833.280483] RBP: 00007f59ec0d11d0 R08: 0000000000000000 R09: 0000000020000080 [ 833.280491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 833.280499] R13: 00007ffd83a9d8bf R14: 00007f59ec0d1300 R15: 0000000000022000 [ 833.280516] [ 833.294542] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.298363] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.307364] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.311089] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.331183] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.332186] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.339367] SELinux: security_context_str_to_sid () failed with errno=-22 [ 833.362248] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 48) 15:55:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:22 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x600, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:22 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x721f, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:22 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:22 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) (fail_nth: 45) [ 842.895048] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.898817] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.900396] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 842.901524] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.905014] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.905860] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.906991] vfat: Bad value for 'defcontext' [ 842.909976] FAULT_INJECTION: forcing a failure. [ 842.909976] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 842.912164] CPU: 0 UID: 0 PID: 6934 Comm: syz-executor.5 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 842.912207] Tainted: [W]=WARN [ 842.912217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.912232] Call Trace: [ 842.912241] [ 842.912252] dump_stack_lvl+0xfa/0x120 [ 842.912299] should_fail_ex+0x4d7/0x5e0 [ 842.912335] _copy_to_user+0x32/0xd0 [ 842.912372] simple_read_from_buffer+0xe0/0x180 [ 842.912416] proc_fail_nth_read+0x18a/0x240 [ 842.912447] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 842.912477] ? security_file_permission+0x22/0x90 [ 842.912520] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 842.912550] vfs_read+0x1eb/0xc70 [ 842.912583] ? __pfx_vfs_read+0x10/0x10 [ 842.912612] ? lock_release+0xc8/0x290 [ 842.912649] ? __fget_files+0x20d/0x3b0 [ 842.912695] ksys_read+0x121/0x240 [ 842.912722] ? __pfx_ksys_read+0x10/0x10 [ 842.912761] do_syscall_64+0xbf/0x360 [ 842.912788] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 842.912815] RIP: 0033:0x7f6bdd38769c [ 842.912836] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 842.912862] RSP: 002b:00007f6bda94a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 842.912888] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6bdd38769c [ 842.912907] RDX: 000000000000000f RSI: 00007f6bda94a1e0 RDI: 0000000000000003 [ 842.912924] RBP: 00007f6bda94a1d0 R08: 0000000000000000 R09: 0000000020000080 [ 842.912942] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 842.912958] R13: 00007fffd0c62a7f R14: 00007f6bda94a300 R15: 0000000000022000 [ 842.912996] 15:55:22 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) (fail_nth: 49) 15:55:22 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:22 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 842.950189] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.954456] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.963849] SELinux: security_context_str_to_sid () failed with errno=-22 [ 842.987177] SELinux: security_context_str_to_sid () failed with errno=-22 [ 843.031031] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 843.037280] SELinux: security_context_str_to_sid () failed with errno=-22 [ 843.062112] SELinux: security_context_str_to_sid () failed with errno=-22 [ 843.066052] SELinux: security_context_str_to_sid () failed with errno=-22 [ 843.073607] FAULT_INJECTION: forcing a failure. [ 843.073607] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 843.075576] CPU: 0 UID: 0 PID: 6943 Comm: syz-executor.2 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 843.075614] Tainted: [W]=WARN [ 843.075622] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 843.075637] Call Trace: [ 843.075645] [ 843.075655] dump_stack_lvl+0xfa/0x120 [ 843.075704] should_fail_ex+0x4d7/0x5e0 [ 843.075737] _copy_to_user+0x32/0xd0 [ 843.075769] simple_read_from_buffer+0xe0/0x180 [ 843.075809] proc_fail_nth_read+0x18a/0x240 [ 843.075836] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 843.075864] ? security_file_permission+0x22/0x90 [ 843.075903] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 843.075929] vfs_read+0x1eb/0xc70 [ 843.075960] ? __pfx_vfs_read+0x10/0x10 [ 843.075997] ? lock_release+0xc8/0x290 [ 843.076029] ? __fget_files+0x20d/0x3b0 [ 843.076064] ksys_read+0x121/0x240 [ 843.076088] ? __pfx_ksys_read+0x10/0x10 [ 843.076123] do_syscall_64+0xbf/0x360 [ 843.076147] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 843.076172] RIP: 0033:0x7f6d0c11069c [ 843.076190] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 843.076214] RSP: 002b:00007f6d096d3170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 843.076237] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6d0c11069c [ 843.076254] RDX: 000000000000000f RSI: 00007f6d096d31e0 RDI: 0000000000000004 [ 843.076269] RBP: 00007f6d096d31d0 R08: 0000000000000000 R09: 0000000020000080 [ 843.076284] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 843.076299] R13: 00007ffd448e09df R14: 00007f6d096d3300 R15: 0000000000022000 [ 843.076332] 15:55:31 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:55:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:31 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:31 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:55:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x700, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 851.943646] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.945595] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.950907] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.953795] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.958906] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.965117] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 851.968589] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.973547] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:31 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 851.977131] SELinux: security_context_str_to_sid () failed with errno=-22 [ 851.980433] vfat: Bad value for 'defcontext' 15:55:31 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 851.999190] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.001380] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:31 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:31 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 852.046306] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.051890] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:31 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x1020, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:31 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 852.071649] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.096133] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.101304] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 852.105127] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.128455] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.153623] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.162316] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.165411] SELinux: security_context_str_to_sid () failed with errno=-22 [ 852.183866] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x1e4d, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:55:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 860.608396] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 860.610155] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.616237] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.618795] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.625952] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.640194] vfat: Bad value for 'defcontext' [ 860.642324] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.651628] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.652388] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.654602] vfat: Bad value for 'defcontext' [ 860.657923] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.662382] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x2000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 860.697086] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.716377] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.720429] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.733728] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:40 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xe0ffff, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:40 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1f1e0000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:40 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 860.764231] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 860.796168] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:55:40 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x2010, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:40 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 860.862572] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.865841] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.869202] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.877255] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.884940] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.905211] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.919049] vfat: Bad value for 'defcontext' [ 860.923376] vfat: Bad value for 'defcontext' [ 860.949037] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.980527] SELinux: security_context_str_to_sid () failed with errno=-22 [ 860.989562] SELinux: security_context_str_to_sid () failed with errno=-22 [ 861.019250] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x20100000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:55:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:55:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x4d1e, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 870.529379] vfat: Bad value for 'defcontext' [ 870.533891] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 870.534315] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.536927] vfat: Bad value for 'defcontext' [ 870.537159] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.540363] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.541714] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.547931] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.550497] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.553328] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.556266] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.561897] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.567386] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:50 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8cffffff, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 870.585792] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:55:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:50 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 870.629313] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.630024] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.634166] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:50 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0xedc0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 870.661222] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:50 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xf6ffffff, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:50 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 870.685170] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.718371] vfat: Bad value for 'defcontext' [ 870.726132] vfat: Bad value for 'defcontext' [ 870.731647] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 870.739816] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.743240] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 870.744999] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.758227] SELinux: security_context_str_to_sid () failed with errno=-22 [ 870.794591] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:58 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xffffe000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:55:58 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:58 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x80000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:58 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xbf, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:55:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:55:58 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 878.892576] vfat: Bad value for 'defcontext' [ 878.894576] vfat: Bad value for 'defcontext' 15:55:58 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 878.915480] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.928756] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.933897] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.941184] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.953107] vfat: Bad value for 'defcontext' [ 878.956685] vfat: Bad value for 'defcontext' 15:55:58 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 878.968733] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.970377] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.971523] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 878.976482] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.982634] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 878.985436] SELinux: security_context_str_to_sid () failed with errno=-22 [ 878.987539] SELinux: security_context_str_to_sid () failed with errno=-22 15:55:58 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 878.998923] SELinux: security_context_str_to_sid () failed with errno=-22 [ 879.081259] SELinux: security_context_str_to_sid () failed with errno=-22 [ 879.099853] SELinux: security_context_str_to_sid () failed with errno=-22 [ 879.100201] SELinux: security_context_str_to_sid () failed with errno=-22 [ 879.105035] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0xe0ffff, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:56:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xffffff8c, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:56:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 887.908211] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.909921] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.912439] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 887.916450] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 887.917537] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.923026] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.930303] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.940328] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 887.943369] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.950180] SELinux: security_context_str_to_sid () failed with errno=-22 [ 887.951867] vfat: Bad value for 'defcontext' 15:56:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x1000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 887.962517] vfat: Bad value for 'defcontext' 15:56:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 888.001423] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.010759] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xfffffff6, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 888.028570] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.044825] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 888.048099] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.052285] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:56:07 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:56:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xef1e0000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 888.083507] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.086521] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 888.111369] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 888.138495] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 888.160395] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.163342] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.180598] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.182319] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.183270] vfat: Bad value for 'defcontext' [ 888.195201] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.196722] SELinux: security_context_str_to_sid (s) failed with errno=-22 15:56:07 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x2000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 888.203966] vfat: Bad value for 'defcontext' [ 888.210879] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 888.226213] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:07 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:07 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:56:07 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 888.281880] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.282052] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.286148] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.290555] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.297441] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 888.298396] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.325511] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.332235] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.335441] SELinux: security_context_str_to_sid () failed with errno=-22 [ 888.342108] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x3000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:17 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:56:17 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x10000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:56:17 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:17 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xffffe000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x80000000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 897.657588] vfat: Bad value for 'defcontext' [ 897.662449] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.664996] vfat: Bad value for 'defcontext' 15:56:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 897.691400] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.702374] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.705282] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.710006] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.734938] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 897.740635] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:17 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 897.754654] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.760836] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.765885] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:17 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x4000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 897.778417] vfat: Bad value for 'defcontext' [ 897.782581] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.787012] vfat: Bad value for 'defcontext' [ 897.791361] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:17 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x8000000000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 897.877695] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.889104] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.891898] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.929634] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.932578] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.956479] vfat: Bad value for 'defcontext' [ 897.960612] SELinux: security_context_str_to_sid () failed with errno=-22 [ 897.962045] vfat: Bad value for 'defcontext' 15:56:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xe0ffff00000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:56:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:56:25 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x5000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 905.878070] vfat: Bad value for 'defcontext' [ 905.880145] vfat: Bad value for 'defcontext' [ 905.891504] SELinux: security_context_str_to_sid () failed with errno=-22 [ 905.900961] SELinux: security_context_str_to_sid () failed with errno=-22 [ 905.903085] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:25 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x80000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 905.921460] SELinux: security_context_str_to_sid () failed with errno=-22 [ 905.922551] SELinux: security_context_str_to_sid () failed with errno=-22 [ 905.925593] SELinux: security_context_str_to_sid () failed with errno=-22 [ 905.927373] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 905.933400] SELinux: security_context_str_to_sid () failed with errno=-22 [ 905.944251] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:25 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) [ 905.976446] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:25 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:25 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x6000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:25 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) [ 906.001960] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.010327] SELinux: security_context_str_to_sid () failed with errno=-22 15:56:25 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x100000000000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:25 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) [ 906.044883] vfat: Bad value for 'defcontext' [ 906.048478] vfat: Bad value for 'defcontext' [ 906.074193] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 906.080624] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.083861] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.096160] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.101915] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.106137] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.124423] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.150947] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.182025] SELinux: security_context_str_to_sid () failed with errno=-22 [ 906.223150] kmemleak: Found object by alias at 0x607f1a638f5c [ 906.223180] CPU: 1 UID: 0 PID: 7237 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 906.223213] Tainted: [W]=WARN [ 906.223221] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 906.223234] Call Trace: [ 906.223241] [ 906.223250] dump_stack_lvl+0xca/0x120 [ 906.223290] __lookup_object+0x94/0xb0 [ 906.223319] delete_object_full+0x27/0x70 [ 906.223348] free_percpu+0x30/0x1160 [ 906.223377] ? arch_uprobe_clear_state+0x16/0x140 [ 906.223413] futex_hash_free+0x38/0xc0 [ 906.223438] mmput+0x2d3/0x390 [ 906.223472] do_exit+0x79d/0x2970 [ 906.223496] ? lock_release+0xc8/0x290 [ 906.223527] ? __pfx_do_exit+0x10/0x10 [ 906.223553] ? find_held_lock+0x2b/0x80 [ 906.223584] ? get_signal+0x835/0x2340 [ 906.223620] do_group_exit+0xd3/0x2a0 [ 906.223648] get_signal+0x2315/0x2340 [ 906.223687] ? __virt_addr_valid+0x2e8/0x5d0 [ 906.223728] ? __pfx_get_signal+0x10/0x10 [ 906.223758] ? do_futex+0x135/0x370 [ 906.223783] ? __pfx_do_futex+0x10/0x10 [ 906.223805] ? trace_irq_enable.constprop.0+0xc2/0x100 [ 906.223832] arch_do_signal_or_restart+0x80/0x790 [ 906.223865] ? __pfx_arch_do_signal_or_restart+0x10/0x10 [ 906.223895] ? __x64_sys_futex+0x1c9/0x4d0 [ 906.223918] ? __x64_sys_futex+0x1d2/0x4d0 [ 906.223946] ? __pfx___x64_sys_futex+0x10/0x10 [ 906.223972] ? __pfx___x64_sys_mount+0x10/0x10 [ 906.224003] exit_to_user_mode_loop+0x8b/0x110 [ 906.224027] do_syscall_64+0x2f7/0x360 [ 906.224049] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 906.224071] RIP: 0033:0x7f59eeb5bb19 [ 906.224088] Code: Unable to access opcode bytes at 0x7f59eeb5baef. [ 906.224098] RSP: 002b:00007f59ec0d1218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 906.224119] RAX: fffffffffffffe00 RBX: 00007f59eec6ef68 RCX: 00007f59eeb5bb19 [ 906.224134] RDX: 0000000000000000 RSI: 0000000000000080 RDI: 00007f59eec6ef68 [ 906.224148] RBP: 00007f59eec6ef60 R08: 0000000000000000 R09: 0000000000000000 [ 906.224162] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f59eec6ef6c [ 906.224175] R13: 00007ffd83a9d8bf R14: 00007f59ec0d1300 R15: 0000000000022000 [ 906.224205] [ 906.224212] kmemleak: Object (percpu) 0x607f1a638f58 (size 8): [ 906.224225] kmemleak: comm "systemd", pid 1, jiffies 4295572768 [ 906.224238] kmemleak: min_count = 1 [ 906.224246] kmemleak: count = 0 [ 906.224253] kmemleak: flags = 0x21 [ 906.224261] kmemleak: checksum = 0 [ 906.224268] kmemleak: backtrace: [ 906.224275] pcpu_alloc_noprof+0x87a/0x1170 [ 906.224303] percpu_ref_init+0x37/0x400 [ 906.224335] cgroup_mkdir+0x28a/0x1110 [ 906.224359] kernfs_iop_mkdir+0x111/0x190 [ 906.224385] vfs_mkdir+0x59a/0x8d0 [ 906.224413] do_mkdirat+0x19f/0x3d0 [ 906.224432] __x64_sys_mkdir+0xf3/0x140 [ 906.224452] do_syscall_64+0xbf/0x360 [ 906.224468] entry_SYSCALL_64_after_hwframe+0x77/0x7f 15:56:35 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:35 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=s']) 15:56:35 executing program 1: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext']) 15:56:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x2010, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:35 executing program 6: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1, 0x7000000, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=']) 15:56:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x721f0000, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) 15:56:35 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x200000000000000, 0x0, 0x0, 0x1000001, &(0x7f0000000400)=ANY=[@ANYBLOB='shortname=mixed,defcontext=', @ANYBLOB]) [ 916.094016] SELinux: security_context_str_to_sid () failed with errno=-22 [ 916.095639] SELinux: security_context_str_to_sid (s) failed with errno=-22 [ 916.099503] SELinux: security_context_str_to_sid () failed with errno=-22 [ 916.105307] SELinux: security_context_str_to_sid () failed with errno=-22 [ 916.110535] SELinux: security_context_str_to_sid () failed with errno=-22 [ 916.115926] BUG: unable to handle page fault for address: ffffed102284880e [ 916.116482] #PF: supervisor read access in kernel mode [ 916.116581] vfat: Bad value for 'defcontext' [ 916.116896] #PF: error_code(0x0000) - not-present page [ 916.116904] PGD 7ffd4067 P4D 7ffd4067 PUD 7ffd3067 PMD 0 [ 916.116931] Oops: Oops: 0000 [#1] SMP KASAN NOPTI [ 916.116947] CPU: 0 UID: 0 PID: 7254 Comm: syz-executor.4 Tainted: G W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 916.118473] vfat: Bad value for 'defcontext' [ 916.118528] Tainted: [W]=WARN [ 916.118533] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 916.121514] RIP: 0010:perf_tp_event+0x175/0xe70 [ 916.121894] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 916.123333] RSP: 0018:ffff888016e87780 EFLAGS: 00010012 [ 916.123752] RAX: 1ffff1102284880e RBX: ffff888114243e80 RCX: ffffc90006021000 [ 916.124314] RDX: 0000000000040000 RSI: ffffffff818995b7 RDI: ffff888114244070 [ 916.124875] RBP: ffff888016e879f0 R08: ffff88806ce31340 R09: ffffe8ffffc15f58 [ 916.125443] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 916.126002] R13: 0000000000000014 R14: ffff88806ce31340 R15: dffffc0000000000 [ 916.126562] FS: 00007f59ec0d1700(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 916.127193] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 916.127658] CR2: ffffed102284880e CR3: 000000001e820000 CR4: 0000000000350ef0 [ 916.128221] Call Trace: [ 916.128429] [ 916.128615] ? __pfx_perf_tp_event+0x10/0x10 [ 916.128984] ? __asan_memcpy+0x3d/0x60 [ 916.129299] ? visit_groups_merge.constprop.0.isra.0+0x6e7/0x1150 [ 916.129791] ? __pfx_visit_groups_merge.constprop.0.isra.0+0x10/0x10 [ 916.130302] ? lock_is_held_type+0x9e/0x120 [ 916.130652] ? ctx_sched_in+0x134/0x9b0 [ 916.130812] SELinux: security_context_str_to_sid () failed with errno=-22 [ 916.130971] ? css_rstat_updated+0x1b8/0x4d0 [ 916.138444] ? __pfx_css_rstat_updated+0x10/0x10 [ 916.138834] ? lock_is_held_type+0x9e/0x120 [ 916.139184] ? trace_pelt_se_tp+0xdf/0x130 [ 916.139530] ? perf_trace_run_bpf_submit+0xef/0x180 [ 916.139934] ? lock_is_held_type+0x9e/0x120 [ 916.140287] perf_trace_run_bpf_submit+0xef/0x180 [ 916.140682] perf_trace_preemptirq_template+0x259/0x430 [ 916.141123] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 916.141596] ? check_preempt_wakeup_fair+0x406/0x950 [ 916.142003] ? find_held_lock+0x2b/0x80 [ 916.142331] ? try_to_wake_up+0x8ae/0x11d0 [ 916.142679] ? _raw_spin_unlock_irqrestore+0x2c/0x50 [ 916.143090] trace_irq_enable.constprop.0+0xa6/0x100 [ 916.143493] trace_hardirqs_on+0x26/0x40 [ 916.143812] _raw_spin_unlock_irqrestore+0x2c/0x50 [ 916.144208] try_to_wake_up+0x8ae/0x11d0 [ 916.144536] ? __pfx_try_to_wake_up+0x10/0x10 [ 916.144903] ? plist_del+0x122/0x270 [ 916.145213] ? find_held_lock+0x2b/0x80 [ 916.145534] ? futex_wake+0x474/0x540 [ 916.145845] wake_up_q+0xa1/0x130 [ 916.146128] futex_wake+0x47e/0x540 [ 916.146423] ? __pfx_futex_wake+0x10/0x10 [ 916.146754] ? __do_sys_perf_event_open+0x44d/0x2c20 [ 916.147155] ? lock_release+0xc8/0x290 [ 916.147470] do_futex+0x26d/0x370 [ 916.147751] ? __pfx_do_futex+0x10/0x10 [ 916.148069] __x64_sys_futex+0x1c9/0x4d0 [ 916.148392] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 916.148858] ? __pfx___x64_sys_futex+0x10/0x10 [ 916.149228] ? xfd_validate_state+0x55/0x180 [ 916.149591] do_syscall_64+0xbf/0x360 [ 916.149895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 916.150298] RIP: 0033:0x7f59eeb5bb19 [ 916.150593] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.151571] SELinux: security_context_str_to_sid () failed with errno=-22 [ 916.152003] RSP: 002b:00007f59ec0d1218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 916.152016] RAX: ffffffffffffffda RBX: 00007f59eec6ef68 RCX: 00007f59eeb5bb19 [ 916.152026] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f59eec6ef6c [ 916.152035] RBP: 00007f59eec6ef60 R08: 000000000000000e R09: 0000000000000000 [ 916.152043] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f59eec6ef6c [ 916.152051] R13: 00007ffd83a9d8bf R14: 00007f59ec0d1300 R15: 0000000000022000 [ 916.152064] [ 916.156733] Modules linked in: [ 916.157000] CR2: ffffed102284880e [ 916.157274] ---[ end trace 0000000000000000 ]--- [ 916.157642] RIP: 0010:perf_tp_event+0x175/0xe70 [ 916.158016] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 916.159425] RSP: 0018:ffff888016e87780 EFLAGS: 00010012 [ 916.159838] RAX: 1ffff1102284880e RBX: ffff888114243e80 RCX: ffffc90006021000 [ 916.160390] RDX: 0000000000040000 RSI: ffffffff818995b7 RDI: ffff888114244070 [ 916.160950] RBP: ffff888016e879f0 R08: ffff88806ce31340 R09: ffffe8ffffc15f58 [ 916.161503] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 916.162056] R13: 0000000000000014 R14: ffff88806ce31340 R15: dffffc0000000000 [ 916.162610] FS: 00007f59ec0d1700(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 916.163237] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 916.163692] CR2: ffffed102284880e CR3: 000000001e820000 CR4: 0000000000350ef0 [ 916.164247] note: syz-executor.4[7254] exited with irqs disabled [ 916.164769] BUG: unable to handle page fault for address: ffffed102284880e [ 916.165321] #PF: supervisor read access in kernel mode [ 916.165729] #PF: error_code(0x0000) - not-present page [ 916.166134] PGD 7ffd4067 P4D 7ffd4067 PUD 7ffd3067 PMD 0 [ 916.166578] Oops: Oops: 0000 [#2] SMP KASAN NOPTI [ 916.166960] CPU: 0 UID: 0 PID: 7254 Comm: syz-executor.4 Tainted: G D W 6.17.0-rc3-next-20250829 #1 PREEMPT(voluntary) [ 916.167888] Tainted: [D]=DIE, [W]=WARN [ 916.168190] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 916.168837] RIP: 0010:perf_tp_event+0x175/0xe70 [ 916.169224] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 916.170634] RSP: 0018:ffff88806ce08b80 EFLAGS: 00010012 [ 916.171051] RAX: 1ffff1102284880e RBX: ffff888114243e80 RCX: 0000000000000002 [ 916.171606] RDX: ffff888046d98000 RSI: ffffffff818995b7 RDI: ffff888114244070 [ 916.172163] RBP: ffff88806ce08df0 R08: ffff88806ce313e8 R09: ffffe8ffffc15f58 [ 916.172721] R10: 0000000000000000 R11: ffff88801e0f1498 R12: dffffc0000000000 [ 916.173284] R13: 0000000000000014 R14: ffff88806ce313e8 R15: dffffc0000000000 [ 916.173847] FS: 00007f59ec0d1700(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 916.174482] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 916.174941] CR2: ffffed102284880e CR3: 000000001e820000 CR4: 0000000000350ef0 [ 916.175499] Call Trace: [ 916.175703] [ 916.175883] ? __pfx_perf_tp_event+0x10/0x10 [ 916.176240] ? enqueue_task_fair+0xded/0x1e00 [ 916.176602] ? check_preempt_wakeup_fair+0x6e/0x950 [ 916.177012] ? wakeup_preempt+0x140/0x2a0 [ 916.177344] ? lock_release+0x1c7/0x290 [ 916.177664] ? lock_release+0x1c7/0x290 [ 916.177984] ? do_raw_spin_unlock+0x53/0x220 [ 916.178339] ? _raw_spin_unlock_irqrestore+0x22/0x50 [ 916.178744] ? try_to_wake_up+0x8ae/0x11d0 [ 916.179090] ? do_raw_spin_lock+0x123/0x260 [ 916.179434] ? __pfx_do_raw_spin_lock+0x10/0x10 [ 916.179808] ? perf_trace_run_bpf_submit+0xef/0x180 [ 916.180207] perf_trace_run_bpf_submit+0xef/0x180 [ 916.180597] perf_trace_preemptirq_template+0x259/0x430 [ 916.181033] ? read_tsc+0x9/0x20 [ 916.181317] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 916.181787] ? clockevents_program_event+0x135/0x360 [ 916.182196] ? tick_program_event+0xac/0x140 [ 916.182550] ? handle_softirqs+0x16e/0x770 [ 916.182897] trace_irq_enable.constprop.0+0xa6/0x100 [ 916.183295] trace_hardirqs_on+0x26/0x40 [ 916.183614] handle_softirqs+0x16e/0x770 [ 916.183947] __irq_exit_rcu+0xc4/0x100 [ 916.184267] irq_exit_rcu+0x9/0x20 [ 916.184555] sysvec_apic_timer_interrupt+0x70/0x80 [ 916.184957] [ 916.185148] [ 916.185334] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 916.185746] RIP: 0010:make_task_dead+0xa2/0x3b0 [ 916.186118] Code: 38 00 85 db 0f 84 21 01 00 00 e8 d9 96 38 00 9c 5b 81 e3 00 02 00 00 31 ff 48 89 de e8 27 92 38 00 48 85 db 0f 84 17 01 00 00 b9 96 38 00 31 ff 65 8b 1d 60 df 48 06 81 e3 ff ff ff 7f 89 de [ 916.187521] RSP: 0018:ffff888016e87f28 EFLAGS: 00000246 [ 916.187933] RAX: 0000000000000001 RBX: ffff888046d98000 RCX: ffffffff817c2b86 [ 916.188488] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffffffff813b5234 [ 916.189047] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 916.189603] R10: ffffffff8643ac57 R11: fffffffffffdbc58 R12: ffff888046d98000 [ 916.190156] R13: 0000000000000009 R14: ffff888016e87760 R15: 0000000000000000 [ 916.190711] ? trace_irq_enable.constprop.0+0x26/0x100 [ 916.191126] ? make_task_dead+0x214/0x3b0 [ 916.191457] ? make_task_dead+0x214/0x3b0 [ 916.191789] ? do_syscall_64+0xbf/0x360 [ 916.192103] rewind_stack_and_make_dead+0x16/0x20 [ 916.192489] RIP: 0033:0x7f59eeb5bb19 [ 916.192783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 916.194203] RSP: 002b:00007f59ec0d1218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 916.194796] RAX: ffffffffffffffda RBX: 00007f59eec6ef68 RCX: 00007f59eeb5bb19 [ 916.195353] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f59eec6ef6c [ 916.195914] RBP: 00007f59eec6ef60 R08: 000000000000000e R09: 0000000000000000 [ 916.196475] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f59eec6ef6c [ 916.197036] R13: 00007ffd83a9d8bf R14: 00007f59ec0d1300 R15: 0000000000022000 [ 916.197591] [ 916.197778] Modules linked in: [ 916.198033] CR2: ffffed102284880e [ 916.198306] ---[ end trace 0000000000000000 ]--- [ 916.198673] RIP: 0010:perf_tp_event+0x175/0xe70 [ 916.199049] Code: ff df 48 89 85 a8 fd ff ff 48 c1 e8 03 4c 01 e0 48 89 85 c8 fd ff ff e8 c9 51 ea ff 48 8d bb f0 01 00 00 48 89 f8 48 c1 e8 03 <42> 0f b6 04 20 84 c0 74 08 3c 03 0f 8e c5 0b 00 00 44 8b ab f0 01 [ 916.200458] RSP: 0018:ffff888016e87780 EFLAGS: 00010012 [ 916.200874] RAX: 1ffff1102284880e RBX: ffff888114243e80 RCX: ffffc90006021000 [ 916.201436] RDX: 0000000000040000 RSI: ffffffff818995b7 RDI: ffff888114244070 [ 916.201992] RBP: ffff888016e879f0 R08: ffff88806ce31340 R09: ffffe8ffffc15f58 [ 916.202550] R10: 0000000000000000 R11: 0000000000000001 R12: dffffc0000000000 [ 916.203106] R13: 0000000000000014 R14: ffff88806ce31340 R15: dffffc0000000000 [ 916.203663] FS: 00007f59ec0d1700(0000) GS:ffff8880e55dd000(0000) knlGS:0000000000000000 [ 916.204287] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 916.204742] CR2: ffffed102284880e CR3: 000000001e820000 CR4: 0000000000350ef0 [ 916.205306] Kernel panic - not syncing: Fatal exception in interrupt [ 916.206044] Kernel Offset: disabled [ 916.206331] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]--- VM DIAGNOSIS: 15:56:36 Registers: info registers vcpu 0 RAX=0000000000000002 RBX=1ffff11002dd0e4b RCX=ffffffff8154bebf RDX=ffff888046d98000 RSI=ffffffff8154bead RDI=0000000000000001 RBP=0000000000000001 RSP=ffff888016e87248 R8 =0000000000000001 R9 =0000000000000000 R10=0000000000000001 R11=fffffffffffdaf28 R12=0000000000000020 R13=0000000000000000 R14=ffff888047615280 R15=ffff888016e87310 RIP=ffffffff8173e788 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f59ec0d1700 00000000 00000000 GS =0000 ffff8880e55dd000 00000000 00000000 LDT=0000 fffffe2c00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=ffffed102284880e CR3=000000001e820000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00007f59eec427c000007f59eec427c8 XMM02=00007f59eec427e000007f59eec427c0 XMM03=00007f59eec427c800007f59eec427c0 XMM04=ffffffff0000ff00000000ff00000000 XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000065 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff828e32c5 RDI=ffffffff88724180 RBP=ffffffff88724140 RSP=ffff88800d22f760 R8 =0000000000000000 R9 =ffffed10015a5046 R10=0000000000000065 R11=3a78756e694c4553 R12=0000000000000065 R13=0000000000000010 R14=ffffffff88724140 R15=ffffffff828e32b0 RIP=ffffffff828e331d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f7955098700 00000000 00000000 GS =0000 ffff8880e56dd000 00000000 00000000 LDT=0000 fffffe5100000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f7955099000 CR3=000000000c105000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ff00000000ff000000000000000000ff XMM01=25252525252525252525252525252525 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=00000000000000000000000000000000 XMM07=00000000000000000000000000000000 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000